Recommendations for reducing risk to your stored data, whatever its form.
- By Roberta Bragg
- 03/01/2005
Misconceptions of encryption keep us from obtaining the full range of benefits it offers.
- By Roberta Bragg
- 02/01/2005
Available now, DomainKeys is one promising entry into the fight against spam.
- By Roberta Bragg
- 01/01/2005
Roberta Bragg looks at Sender ID, the new anti-spam technology being developed by Microsoft.
- By Roberta Bragg
- 11/01/2004
Whether you decide to build your own PKI for security or use a third party, planning is paramount.
- By Roberta Bragg
- 10/01/2004
Catch the culprits through logging, analysis and reporting.
- By Roberta Bragg
- 09/01/2004
It's time to become proactive about stopping computer crime.
- By Roberta Bragg
- 08/01/2004
You can roll your own (pardon the pun) cracks for Windows LM passwords.
- By Roberta Bragg
- 07/01/2004
Boot-up is a dangerous time for your systems, a time before security policies to protect them may be active. Avoid danger with persistent policies.
- By Roberta Bragg
- 06/01/2004
These networks aren’t well known by many, yet they’re responsible for controlling much in our lives. And they’re not very secure.
- By Roberta Bragg
- 05/01/2004
Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- 04/01/2004
Are you role-playing with your network? If not, you’re missing a powerful way to make it more secure.
- By Roberta Bragg
- 03/01/2004
Getting user buy-in for security is critical. Using certificate autoenrollment is a way to make it pain-free.
- By Roberta Bragg
- 02/01/2004
Separation of duties is a good idea in the business world. It’s also a good one in the IT world.
- By Roberta Bragg
- 01/01/2004
Microsoft's Small Business Server 2003 is a big leap forward for security.
- By Roberta Bragg
- 12/01/2003