Email Archiving Facilitates eDiscovery Processes
Let’s eliminate the confusion by understanding the difference between archiving and eDiscovery. Both are tied together, but serve two (2) distinct functions. The everyday operations performed with...
View ArticleThe Dangers of Cross Site Scripting
As of 2007, cross-site scripting carried out on websites were roughly 80% of all documented security vulnerabilities. Cross-site scripting (XSS) is a type of computer security vulnerability typically...
View ArticlePerfect Timing with Obama and Cyber Security Report
A report submitted to Congress on improving national cyber security is right on time, as U.S. President elect Barrack Obama prepares to assume his official duties in January 2009. The Chicago Tribune...
View ArticleArchiving Software Key to Global Financial Crisis
So your company is still sitting on the fence about implementing archiving software for proactive eDiscovery. Will the global financial crisis become your company’s wake up call for eDiscovery...
View ArticleeDiscovery FRCP Rule 26 – Can your company comply?
The “Electronic Discovery Law Blog” published by K & L Gates provides detailed information for plotting an archiving course. Rule 26 is an amendment to the United States Federal Rules of Civil...
View ArticleMicrosoft Calms SSL Security Alert
Today the United States Computer Emergency Readiness Team (US-CERT) updated their website regarding the potential of rogue SSL certificates being generated. US-CERT is part of the United States...
View ArticleWhy should you archive your emails?
Archive solution implementation dictates that the project management team balance 3 variables: Archiving solution still facilitates the day to day business operations, in-line with the company...
View ArticleSix Good Lessons taught by Honeynets
Although a bit dated, a white paper titled “The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks“ provided many security lessons which are still appropriate today. This...
View ArticleApplying Email Archiving and Management Technologies
Today, most enterprises turn to Email Archiving and Management (EAM) to reduce costs and control information overload. With digital information, specifically email and messaging mushrooming faster...
View ArticleSerial Host Naming is Dopey
Many organizations implement the use of serial naming procedures for individual host servers. In most cases, access to these servers is through a single well known host name which uses some kind of...
View Article5 Lessons that Botnets teach Honeypots
One reason organizations implement honeypots is to identify malicious botnets. A honeypot, which is a fake network, is designed to attract and analyze botnet activity. In order for the honeypots to...
View ArticleWhat is Our Email Retention Policy?
Before the email archiving software selection process starts or any implementation meetings begin, something more important must occur first. Quite a few questions regarding email retention policy...
View ArticleRaising the Security Wall Higher
No matter how email users may complain, friendly reminders regarding email security protecting company information assets are part of the ongoing education process. Email users quickly forget that...
View ArticleEDRM Guides Archive Strategy
Started in 2005, the Electronic Discovery Reference Model (EDRM) Project was created to address the lack of standards and guidelines in the electronic discovery market. EDRM is a great reference tool...
View ArticleExchange as a Temporary Archive Solution
Maybe your email archiving and retention project is far off down the road, so in the interim period now might be a good time to organize email folders on your Exchange 2007 server. While you’re...
View ArticleTips for controlling your archive storage system
Although we take email for granted, the use of email can easily get out of control for administrators. People rarely walk down to another office to have a discussion or idea exchange. Writing an...
View ArticleArchive Stubbing Techniques Not Recommended
The benefits associated with archiving Microsoft Exchange email and associated data, creates many cost effective solutions. Archiving facilitates government regulatory or civil litigation searches for...
View ArticleHacker Security Honeypot Guide
“Honeypots: Tracking Hackers“ is a solid primer to this very necessary technology, which becomes a powerful teaching tool. It starts with a basic explanation of honeypots and the different trapping...
View ArticleIs this email authentic?
Authentication of message integrity ensures no one has tampered with the message or modified its content. When authentication is requested, the Message Queuing runtime digitally signs the message when...
View ArticleArchiving is Insurance against eBlackmail
A couple of previous corporate situations in France and Japan highlight the importance for companies to implement archiving systems. Email is the primary communication source for companies being able...
View Article
More Pages to Explore .....