Top 10 steps to a strong security
Devising one catch-all security planning checklist that every type of company could use is well nigh impossible. The need for a baseline guide, however, is great, so searchWindowsManageability asked a security expert to share his security checklist.
Migration, security, and the economy top
2002 management scene
We've put together some predictions for what to expect in 2002. An analyst even predicts that hopes for a happy new year will be realized in an economic comeback.
New software authorizes user network
Meetinghouse Data Communications, Inc. announced this week the availability of its 802.1X authentication software for Windows NT/2000. It promises to secure local area network (LAN) end-user access via encryption technology.
Database security dos and don'ts
Network-centric security measures won't keep hackers from entering the database and corrupting or stealing valuable information. Two database security experts describe the top five ways to bulletproof your database.
Security risks of remote
SearchWindowsManageability expert Scott Blake addresses your fears about updating software remotely.
FOR MORE INFORMATION: