The latest incarnation of Microsoft's primary firewall offering is more secure and easier to use.
New hacking methods make short passwords unsafe, but Microsoft makes it tough to go long. Her's how to forge an effective policy.
- By Derek Melber
- 12/01/2004
Early adopters laud GUI, VPN and administration features.
- By Stephen Swoyer
- 11/01/2004
Round out your new or updated security strategy by establishing a process to evaluate, manage, and deploy patches in your network. Here are some guidelines and tool recommendations.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Honey drops can help you detect attacks in progress--without sticking you with false positives.
- By Mark Burnett and James C. Foster
- 11/01/2004
Concentrate on awareness, process, readiness, and privacy as you put your security plan into action.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Securing your network goes beyond your hardware or software firewalls. You must define the role of each server and then implement delta security policies to protect your services.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Remote access policies are at the heart of remote access--and at the root of most problems. Learn how they work and avoid the mistakes that can lock out your remote users.
Datakey Axis is a simple solution for smart card deployment.
- By Rick A. Butler
- 11/01/2004
Keeping systems patched is time-consuming and laborious, but it's crucial. Here are seven tools that can help you automate the process.
- By David W. Tschanz
- 11/01/2004
Roberta Bragg looks at Sender ID, the new anti-spam technology being developed by Microsoft.
- By Roberta Bragg
- 11/01/2004
Using password filters and longer passphrases will help keep your passwords from being cracked.
- By Derek Melber
- 11/01/2004
Looking for experts for advice on how to get the security certification.
Whether you decide to build your own PKI for security or use a third party, planning is paramount.
- By Roberta Bragg
- 10/01/2004
Smart cards and tokens add layers of authentication protection.
- By Roberta Bragg
- 09/27/2004
Gathering of female execs sets standard for meetings and plain ol' manners.
- By Roberta Bragg
- 09/20/2004
Be careful who you give Power User privelages to or you may face abuse from within.
- By Roberta Bragg
- 09/13/2004
Free Internet could prove profitable.
- By Roberta Bragg
- 09/08/2004
Passfaces authenticates users by having them recognize faces instead of remembering passwords.
- By Rick A. Butler
- 09/01/2004
Secure the sites, subsites, content, and Web parts that make your Intranet such a powerful tool, without destroying its usefulness.
- By Bill Schneider
- 09/01/2004