Security: How To Control Data LeaksBy Baselinemag | Posted 2006-08-22 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
SECURITY Q&A: Howard Schmidt on Today's Security Leaks
The former chief security officer at eBay and Microsoft offers his insights on securing laptops and other mobile devices.
SECURITY CASE STUDY: Rockwell Collins' Secure Flight to E-Business
The aviation electronics company found a way to open up its intranet to customers and suppliersand avoid an onerous process to authenticate users.
SECURITY BLOG: Patch Tuesday Wasn't My Day
Earlier this month, the U.S. Department of Homeland Security warned Microsoft users to patch a serious flaw in Windows. Baseline senior editor Deborah Gage explains how any fallout from such flaws will show us how goodor badour cybersecurity warning systems are now. For more, see: go.baselinemag.com/gage
QUESTION: What do you think is the most worrisome information security threat? Write a letter to the editor at: email@example.com.