Stories by Susan Perschke

How we tested DLP products

We tested multiple common endpoint scenarios, by trying to upload, print, email or otherwise transfer data that should be blocked, quarantined, warned about or simply monitored under the rules and policies we set up. The following specific types of endpoint tests were conducted:

How to avoid 5 common email management mistakes

Email managers have a lot at stake. After all, the volume of global electronic messages sent via email dwarfs all other forms of electronic communication, including social networking. Since the inception of electronic mail, which, according to some Internet historians, can be traced to a small mainframe app called 'MAILBOX' from the mid-1960s, human-to-human messages have been created, transmitted and stored in electronic format. But early email administrators could hardly have envisioned the complexity of current email infrastructure and the concomitant maze of technical, security, business and regulatory challenges.

Hackers target IPv6

If your IPv6 strategy is to delay implementation as long as you can, you still must address IPv6 security concerns right now.

Watch out for FOSS advertising

The appeal of free and open source software is undeniable - after all, who doesn't want to take advantage of OPM (other people's money) to develop a finished software product or platform that would otherwise require long lead times, dedicated programming resources and significant cost? 

IPv6: What you need to do now

With the official exhaustion of IPv4 open-pool addresses in February, the long migration path to IPv6 has passed another important milestone. Since the IANA IPv6 worldwide deployment announcement in 1999, the issue has never been whether, but simply when IPv6 would become the core protocol for global Internet traffic.

[]