Stories by Bill Brenner

7 Deadly Sins of Network Security

Companies that suffer serious security breaches have almost always committed one (or all) of 7 deadly security sins. Is your company guilty?

Written by Bill Brenner11 Dec. 08 11:52

5 Must-Do Cyber Security Steps for Obama

As President-Elect Obama focuses on two wars and a hemorrhaging economy, security experts are urging him to address five weak security links in America's cyber infrastructure that threaten the nation's defenses and financial institutions.

Written by Bill Brenner04 Dec. 08 08:50

International Challenges in PCI Security

In a country that's seen many regulatory compliance challenges this decade, the headaches of PCI security tend to be analyzed from a largely American perspective.

Written by Bill Brenner20 Nov. 08 09:15

How IT Helped Catch the Jewellery Thief

A jewellery store chain is having much better luck catching burglars in real time, thanks to a little help from the IT side of the house. Loss Prevention Manager Dennis Thomas explains how the company built its high-tech command center from scratch.

Written by Bill Brenner13 Nov. 08 11:52

A tale of two PCI security audits

Robert Duran of Time and Allan Kintigh of National Card Services share their PCI auditing experiences. Why one's experience was unpleasant and the other fared better.

Written by Bill Brenner06 Nov. 08 09:35

PCI's Post-Audit Pain Points

Passed your first PCI compliance audit? You've only just begun! Veterans say ongoing challenges with log management, database encryption and upper management buy-in mean the task is never finished.

Written by Bill Brenner06 Nov. 08 10:01

Third-party anonymous proxies? No! No! No!

This is the third installment of a three-part series on the pros and cons of anonymous proxy services. Read the first installment here and listen to the second installment here.

Written by Bill Brenner23 Oct. 08 11:44

Six essential steps to secure academia

Computer networks in the academic world are a lot like the Wild West: It's hard to tell the good guys from the bad, and the sheriff's ability to maintain order is severely limited.

Written by Bill Brenner16 Sept. 08 11:18

Data breaches spark hard-drive shredding boom

Thanks to all the fear over data security breaches, a computer recycling operation has morphed into something much bigger - and potentially more lucrative - for the Saraiva brothers.

Written by Bill Brenner11 Sept. 08 11:50
[]