2006.11.08 Daily Security Reading
by Rodney Campbell on Nov.08, 2006, under Security
Security must focus on desktop policy
The challenge of controlling security threats triggered by users in the workplace shows no sign of abating, new research commissioned by Check Point Software Technologies suggests.
Attackers end-run around IE security
The dependence of Internet Explorer on other Windows components has allowed online attackers to work around the shored-up security of Microsoft’s latest browser.
How much can a LAN switch protect your network?
Call it NAC (Cisco’s Network Admission Control) or, well, NAC (network access control), or even NAP (Microsoft’s Network Access Protection). Any way you refer to it, these schemes for shutting out unwanted users at the LAN switch port level are among the most buzzed about network technologies.