Ten years after launching Trustworthy Computing, Microsoft's software is far safer, but ever as much a target.
Some companies demand that IT track Web use or go even deeper into user behavior. Here are some tips on how to do it right and what tools to use.
While IT managers are trained early on to avoid obvious threats, many still fail to watch out for the basics. From password issues to excessive auditing to not using Group Policy, here's a list of 10 things to make sure your shop is taking care of.
A decade after launching its Trustworthy Computing initiative, Microsoft has come a long way but faces new challenges.
In an interview with Redmond, Coviello recalls where Microsoft was a decade ago when it announced Trustworthy Computing and the progress it has made since.
If you've ever considered attending our independent TechMentor training conference (and meeting some of your favorite Redmond authors in the process), this year may be the year.
Yes, Redmond magazine columnist and Windows author and expert Don Jones uses a Mac -- and not just occasionally. Read on to find out why.
Mary Jo Foley on how Microsoft is trying to unite itself, and whether it's actually working.
Considering buying a SAN? Stop what you're doing. The world of storage is about to change and its future lies in a surprisingly familiar protocol: the Server Message Block (SMB).