Peter Stephenson

Peter Stephenson

Most Recent Articles by Peter Stephenson

Managing access is a tricky, multilayer process

Managing access is a tricky, multilayer process

This month we look at network access control (NAC), identity management (IDM) and data leakage prevention (DLP) tools.

Attestation at its best

Attestation at its best

Private Core vCage protects systems. It's a little complicated under the covers, but in practical use is simplicity itself.

Protecting email both ways

Protecting email both ways

Protecting your organization from attacks brought into the system by email is an ongoing challenge, says Peter Stephenson, technology editor.

Mobile devices are the new endpoints...and both need protecting

Mobile devices are the new endpoints...and both need protecting

The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.

Bits and bytes in intelligence: Umbrella from OpenDNS

Bits and bytes in intelligence: Umbrella from OpenDNS

Umbrella from OpenDNS, a cloud-based network security service, is easy to use and an excellent intelligence resource.

More Articles by Peter Stephenson

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US