Steal These Ideas: 5 Security Experts' Tips and TechniquesBy John McCormick | Posted 2006-05-15 Email Print
WEBINAR: Live Date: December 14, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Modernizing Authentication — What It Takes to Transform Secure Access REGISTER >
Five top computer security experts offer advice on pervasive computing, ever-more-sophisticated hacker attacks, and corporate security resources.
Are software makers doing enough to secure their products? Are chief information and security officers getting the resources they need? And how are companies going to protect pervasive computing environments? Baseline e-mailed these and other questions to some of the nation's top security experts. Here's what they said: