Security


5 Steps to Certificate Bliss

Whether you decide to build your own PKI for security or use a third party, planning is paramount.

Securing Remote Data Access

Smart cards and tokens add layers of authentication protection.

Infosec's Feminine Side

Gathering of female execs sets standard for meetings and plain ol' manners.

Power Hungry

Be careful who you give Power User privelages to or you may face abuse from within.

Wireless for the Common Man

Free Internet could prove profitable.

Face in the Crowd

Passfaces authenticates users by having them recognize faces instead of remembering passwords.

Secure Your Intranet

Secure the sites, subsites, content, and Web parts that make your Intranet such a powerful tool, without destroying its usefulness.

Springboard Upends the Microsoft Roadmap

Security delays with Windows XP SP2 are causing cascading delays all through Microsoft’s delivery schedule.

Microsoft Delivers on Centralized Security

Audit Collection Services provides a scalable means of consolidating security event logs across your enterprise.

Stopping Computer Crime, Part 2

Catch the culprits through logging, analysis and reporting.

Resources for Security

Check out these links for additional information on security.

The Importance of Keeping Time

Unreliable and inaccurate time sources can lead to security vulnearabilities.

Protection Through Isolation

By creating internal network segments, you limit the reach of unauthorized users.

Same Access Tokens, Same Privileges

The magic behind simple access tokens.

Windows XP SP2 Strategies

To install or not to install SP2 is all up to you.

Linux: Avenue for Windows Sneak Attack?

Any hole, irrespective of OS, is the weakest link.

RPC Over HTTP Reloaded

Readers ask for a good resource on configuring this useful but confusing feature of Exchange 2003.

Insecurity, in Black and White

Proper preventive measures can mitigate attacks on data storage.

Two are Better Than One

It's time to make the move to two-factor authentication.

Securing Your Handhelds

Deploying handhelds requires understanding the sensitivity of your data, the strengths & weaknesses of your infrastructure, & the needs of your IT team. There are no easy answers.

Subscribe on YouTube