Rodney Campbell's Blog

2006.08.04 Daily Security Reading

by on Aug.04, 2006, under Security

E-mail privacy in the workplace
Even with a well-heeled corporate privacy policy stating that all employee communications may be monitored in the workplace, the legality of e-mail monitoring is not as clear cut as one might think.

Secure Valuable and Sensitive Data in MySQL
Unlike database backup procedures, which can be automated, securing your data from the prying eyes of unauthorized users requires a certain amount of interaction from the system administrator. If you're using MySQL, there are some easy things you can do to secure your systems and significantly reduce the risk of unauthorized access to your sensitive data.

Black Hat: Hit spyware by punishing purveyors, experts say
Antispyware vendors are losing the fight against spyware creators and will have a tough time catching up, according to a panel discussion at the Black Hat security conference.

New tools test VoIP security
If your VoIP phone starts ringing off the hook, it might not denote a surge in your popularity–just that someone is trying one of 13 newly released security tools.

Day one at Black Hat
If you've been concerned about the death of Black Hat — either because of its purchase last November by CMP, or by the rumors you've heard of a "Microsoft track," — you can relax. The place is jammed.

Day two at Black Hat
The crowds are larger on this second day of Black Hat, though people are moving a little more slowly than yesterday, perhaps because of the free toga party last night at Caesar's Palace, marking the casino's 40th anniversary. Nevertheless, the conference sessions have been packed with intriguing information.


Comments are closed.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.