Feeds

Why Morgan Stanley had to pay that $15m email fine

Two papers about IT security

  • alert
  • submit to reddit

Intelligent flash storage arrays

And so to Reg Whitepapers to fossick this week for security nuggets. We struck a couple of good ones.

Email as Evidence

In 2006 Morgan Stanley agreed to pay a $15m fine to the Securities and Exchange Commission for repeatedly failing to produce emails during the course of investigations. Oh dear. This whitepaper, commissioned by Mimecast, argues that organizations that archive email in a "fractured" environment risk losing control and may struggle to produce evidential-quality email evidence.

This is a good read for anyone concerned with the management of email. The author, Stewart Room, is a lawyer and among other things, the president of the National Association of Data Protection Officers. He has also written a couple of text books. ‘Data Protection and Compliance in Context’ (2006), ‘Email: Law, Practice and Compliance’ (2008).

On-demand security audits and vulnerability management

This is a long-ish whitepaper of two halves.

The first half outlines the value of the various approaches to network security: virus detection, firewalls, intrusion detection systems (IDS) and vulnerability management. There is also a comparison of the various approaches to vulnerability management. The thesis from IT security firm Qualys is that only on-demand security audits and vulnerability management provide a proactive approach, identifying network and device vulnerabilities before networks are compromised. The second half describes Qualys’s security solutions. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.