Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Buying an IPS: Determine why you need intrusion prevention
Learn how to develop the right IPS strategy for your network by first asking why your organization needs intrusion prevention. This is the first in a seven-part series. Continue Reading
How to configure IIS authorization and manager permissions
David Shackleford reviews authorization rules that will help you secure your IIS 7 Web server. Continue Reading
Three portable data storage encryption methods
Mike Chapple looks at three ways to encrypt sensitive data while it's stored on portable media. Continue Reading
-
Using Windows software restriction policies to stop executable code
Software restriction policies are one way to prevent known malware and file-sharing applications from taking control of your network. Continue Reading
Security mergers and acquisitions strategy: Questions you need to ask
Your security vendor has just been acquired. Learn the questions you need to ask and the answers you need to hear. Continue Reading
Are you too small for an email retention and archiving policy?
Joel Snyder reviews how organizations, both large and small, should prepare their email retention and archiving policy.Continue Reading
Considering two-factor authentication? Do cost, risk analysis
One-time passwords and other technologies are effective protection, but midmarket companies have to consider the expense and management overhead.Continue Reading
How to perform an Active Directory health check
Once your Active Directory is up and running, you do need to perform regular maintenance on it. Expert Joel Snyder reveals some of his best AD tricks.Continue Reading
Look into SIEM services to cut costs, comply with PCI DSS, HIPAA
Security information and event management is expensive and complex to deploy and manage, but service providers can take most of the burden off your shoulders.Continue Reading
Windows management tips: How to backup and restore Active Directory
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD.Continue Reading
-
How to encrypt emails in Outlook
Mike Chapple reviews how cryptography can be used to validate senders and keep important emails confidential.Continue Reading
Configuring access control in a Windows Server 2008 infrastructure
Jennifer Jabbusch reviews how four Windows components will help you with various access control and authentication needs.Continue Reading
Encryption basics: How asymmetric and symmetric encryption works
Before you encrypt your files, emails and Web transactions, make sure you know the cryptography basics.Continue Reading
Configuring a Windows network infrastructure: Wired, wireless security
Jennifer Jabbusch explains how four Windows network components will help you achieve better wireless and wired port security authentication.Continue Reading
The security value of a hosted data center
Have you begun converting your office space to a data center? There's a more secure option, says security analyst Joe Malec.Continue Reading