Security delays with Windows XP SP2 are causing cascading delays all through Microsoft’s delivery schedule.
- By Scott Bekker
- 09/01/2004
Audit Collection Services provides a scalable means of consolidating security event logs across your enterprise.
Catch the culprits through logging, analysis and reporting.
- By Roberta Bragg
- 09/01/2004
Check out these links for additional information on security.
Unreliable and inaccurate time sources can lead to security vulnearabilities.
- By Roberta Bragg
- 08/30/2004
By creating internal network segments, you limit the reach of unauthorized users.
- By Roberta Bragg
- 08/23/2004
The magic behind simple access tokens.
- By Bill Boswell
- 08/17/2004
To install or not to install SP2 is all up to you.
- By Roberta Bragg
- 08/16/2004
Any hole, irrespective of OS, is the weakest link.
- By Roberta Bragg
- 08/09/2004
Readers ask for a good resource on configuring this useful but confusing feature of Exchange 2003.
- By Bill Boswell
- 08/03/2004
Proper preventive measures can mitigate attacks on data storage.
- By Roberta Bragg
- 08/02/2004
It's time to make the move to two-factor authentication.
Deploying handhelds requires understanding the sensitivity of your data, the strengths & weaknesses of your infrastructure, & the needs of your IT team. There are no easy answers.
- By Jonathan Gossels and Dick Mackey
- 08/01/2004
A roundup of five biometric products that go the extra security mile—for when passwords alone aren't enough.
- By Roberta Bragg
- 08/01/2004
It's time to become proactive about stopping computer crime.
- By Roberta Bragg
- 08/01/2004
MCP Magazine readers get a crack at the Microsoft CEO.
This admin got a shock when he discovered that usernames and passwords for his new employer's sensitive documents were being sent in cleartext. Fortunately, he was able to see the forest for the trees.
Everyone--Microsoft and its customers--needs to get more serious about the virus threat.
Block anonymous users from accessing confidential information.
- By Roberta Bragg
- 07/26/2004
From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.
- By Mark O'Neill
- 07/20/2004