Steal These Ideas: 5 Security Experts' Tips and Techniques

By John McCormick  |  Posted 2006-05-15 Email Print this article Print


Modernizing Authentication — What It Takes to Transform Secure Access

Five top computer security experts offer advice on pervasive computing, ever-more-sophisticated hacker attacks, and corporate security resources.

Are software makers doing enough to secure their products? Are chief information and security officers getting the resources they need? And how are companies going to protect pervasive computing environments? Baseline e-mailed these and other questions to some of the nation's top security experts. Here's what they said:

Next page: M&T Bank's Matthew M. Speare



Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters