Steal These Ideas: 5 Security Experts' Tips and TechniquesBy John McCormick | Posted 2006-05-15 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
Five top computer security experts offer advice on pervasive computing, ever-more-sophisticated hacker attacks, and corporate security resources.
Are software makers doing enough to secure their products? Are chief information and security officers getting the resources they need? And how are companies going to protect pervasive computing environments? Baseline e-mailed these and other questions to some of the nation's top security experts. Here's what they said: