The Undocumented Layers of the OSI Model and Their Impact on Security

The biggest threat to data security doesn’t come from hackers, misconfigured firewalls, missing patches, or negligent employees. Nor is it in the application layer of the Open Systems Interconnection (OSI) Basic Model. Instead, there are three undocumented layers of the OSI Model that exert a huge influence on security decisions and the integrity of security programs. Learn about those layers and how to manage the threat.

Featured Software Research:

Putting the "I" in CRM Series 1: The Impact to the Sales Team

Customer relationship management (CRM) has long been seen as a must-have sales tool. However, much of the value of traditional CRM accrues to managers, not the reps that use them daily. Learn how CRM designed for the individual benefits the entire sales organization from increased data quality to more predictable revenue pipelines. Read More

Using Analytics to Achieve the Greatest Value for Workforce Initiatives

Human resources (HR) divisions are turning to analytics as a key capability to proactively drive business strategy. HR professionals need a consistent analytical point of reference to make human capital decisions that impact business results in areas such as talent acquisition, employee engagement, and organizational leadership. Without clearly identifying problems that have a direct impact on business performance, organizations run the risk of investing time and energy in areas that are not a priority.... Read More

You may also be interested in these related documents:

Understanding the PCI Data Security Standard

The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance. Read More

A Layered Security Strategy for Preventing Data Leakage, Theft, and Insider Abuse

  • Source: Tizor
  • Written By:
  • Published:
Threats to data content posed by insiders. Compliance regulations entailing stringent data controls. It’s hardly surprising companies need to find more secure methods for keeping confidential data under lock and key. Learn about managing security challenges across three important layers of your IT infrastructure, and how database activity monitoring (DAM) and database auditing and protection (DAP) can help you. Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats. Read More
comments powered by Disqus