It allows virus-checking software in an e-mail to filter on that extension and to search files coming in with that extension more carefully, or to exclude them altogether on a content filtering gateway while allowing the majority of the office docs to pass through without hindrance. My only concern is making a smooth transition to the new format. |
Make diversity too small and you increase the impact of population-level events, make it too diverse and you can reduce manageability and thereby make individual-level events more likely. Heterogeneity has to be balanced with manageability for the organization's maximum benefit. |
Mass-mailing worms will often leverage issues in Office as part of their method of propagation. As such, I strongly advise that these patches be installed as soon as possible -- particularly within the enterprise where the e-mailing of Office documents is more commonplace and expected. |
Rather than setting a universally high security bar across all systems in the enterprise, an enterprise might segregate systems into different 'zones,' |
Since all ICANN decisions are subject to approval by the U.S. Department of Commerce, President Bush can ultimately decide whether or not to allow that change to proceed. No other country has that level of voice in the process. |
The best security organizations I've worked with understand and attempt to quantify the risk-management decisions they make on an ongoing basis. |
The enterprise is starting to recognize that IM is here to stay and that it needs to be secured along with other technologies like HTTP and e-mail. As enterprises realize this, they are interested in protecting that technology with products from the vendors they are already using. |
The idea sounds good because a lot of viruses have used the macro capability of Office for propagation purposes and that's a huge problem, ... Having a new extension for this will allow the virus-checking software on e-mail gateways to filter on that particular extension, either to search files coming in with that extension more carefully, or to exclude them altogether. |
The idea sounds good because a lot of viruses have used the macro capability of Office for propagation purposes and that's a huge problem. Having a new extension for this will allow the virus-checking software on e-mail gateways to filter on that particular extension, either to search files coming in with that extension more carefully, or to exclude them altogether. |
There's also usually a black hat contingent at most mainstream security conferences. Since information security and hacking are two sides of the same coin, many hackers go to security conferences and many security professionals go to hacker events -- neither community seems to mind. |
There's no fundamental difference between using QuickBooks to embezzle funds and using a ledger to embezzle funds, ... The technology just changes how the fraud is accomplished and maybe who commits it; it doesn't change why it's committed. As long as there are criminals, they will find a way to use the existing mechanisms to their advantage. |
There's no fundamental difference between using QuickBooks to embezzle funds and using a ledger to embezzle funds. The technology just changes how the fraud is accomplished and maybe who commits it; it doesn't change why it's committed. As long as there are criminals, they will find a way to use the existing mechanisms to their advantage. |
This helps to explain why trying to prevent the possibility of security breaches entirely is a losing battle. |
Those that favor the preservation of the current model fear that ceding oversight to the U.N. would result in a less 'laissez-faire' environment -- that it would open the door to tighter control and thereby [engender] all the trappings of control: potential taxation, inefficiency, or restriction on free speech. |
When you take into account the fact that a large enterprise might have tens of thousands or hundreds of thousands of machines, the job of securing those machines is very difficult and keeping them secure over time is even more difficult still. |