Intrusion detection isn’t just software—it means monitoring your network to discover attacks. Sometimes that infiltration comes from places you’d never expect.
- By Roberta Bragg
- 02/01/2000
Roberta culls her considerable library to bring you some of the best and worst that’s been published on her favorite topic.
- By Roberta Bragg
- 01/01/2000
Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.
- By Roberta Bragg
- 12/01/1999
Our stalwart columnist tackles your toughest security questions.
- By Roberta Bragg
- 11/01/1999
Understanding how information stays secure can help you make informed choices about your encryption strategies.
- By Roberta Bragg
- 10/01/1999
Security certs won’t guarantee employment but they can help you establish your credentials.
- By Roberta Bragg
- 09/01/1999
Remote access requires a higher level of protection. Armed with this task list, you can retain security through NT Terminal Server and the ICA client.
- By Roberta Bragg
- 08/01/1999
True network protection could mean thinking and acting like a hacker. As an NT administrator, here are your weapons of choice.
- By Roberta Bragg
- 07/01/1999
Now that you understand what it means to have security in a mixed environment, how do you go about achieving it?
- By Roberta Bragg
- 06/01/1999
Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.
- By Roberta Bragg
- 05/01/1999
Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.
- By Roberta Bragg
- 04/01/1999
You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?
- By Roberta Bragg
- 03/01/1999
A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.
- By Roberta Bragg
- 02/01/1999
If your job includes security, the Security Configuration
Editor in SP4 can truly make things much easier. In this
new column, an NT security expert tells what the new release
can do for you.
- By Roberta Bragg
- 01/01/1999