If your company's computer clocks aren't in sync, forensics, backups, and much more can suffer. Simson Garfinkel on getting the time right.
Stories by Simson Garfinkel
Packet flows can help you monitor your network, trace a hacker's footsteps and see how your VPN is used.
One of the hardest things about computer security is making the so-called secure computers easy to use. Indeed, building computers that are both secure and usable is so difficult that many IT professionals believe that security and usability are antagonistic goals that must be balanced.
Few organizations send confidential information on postcards. Credit card statements, medical records, job offers and personal correspondence are invariably sealed in envelopes before they are sent.