Below are a few tips and solutions that can help you secure your Exchange server and protect confidential information from malicious attacks and other risks. Microsoft Exchange runs on Windows Server ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Agencies can ensure that their servers are secure from the start ...
Mike Chapple is a teaching professor of IT, analytics and operations at the University of Notre Dame. A network DMZ likely houses some of the highest-risk servers in an organization: those that ...
Hewlett Packard Enterprise Co. is addressing the growing demands of AI, cloud-native applications and evolving security threats with the launch of its latest generation of compute solutions. The HPE ...
As your business grows, you may find that your Web serving needs quickly outpace simple single-server arrangements. If that's the case, you need to start planning a server farm. Part of that planning ...
In my last article, I started a series on some of the challenges related to spawning secure servers on Amazon EC2. In that column, I discussed some of the overall challenges EC2 presents for security ...
When the security industry thinks about breaches caused by human error, the image of an employee accidentally clicking on a malicious link in a phishing email often comes to mind. But to err is human, ...
Fifteen years ago, you weren’t a participant in the digital age unless you had your own homepage. Even in the late 1990s, services abounded to make personal pages easy to build and deploy—the most ...
Mike Chapple is associate teaching professor of IT, analytics and operations at the University of Notre Dame. A network DMZ likely houses some of the highest-risk servers in a district: those that ...
Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results