• Vista security option changes to named pipe access

    Poorly secured named pipes are a well known way for malicious hackers to infiltrate Windows networks. A hacker could take advantage of these named pipes by connecting to a Windows system as an anonymous user. With the advent of Windows XP, however, ...  Continue Reading

  • Endpoint security

    Guest instructor Ben Rothke, provides tactics for endpoint security, policies for controlling endpoints and insight as to where endpoint security technology is headed.  Continue Reading

  • Identity and Access Management Security School

    Security concerns are moving from centralized networks to remote offices, to endpoints and to the Internet. This increases the need for better identity and access management. This Security School explores critical topics related to helping security ...  Continue Reading

  • VPNs and remote access

    Virtual private networks can reduce the cost of business communication while extending secure remote access to teleworkers, travelers and mobile professionals. But deploying and managing a secure VPN can be challenging. In this lesson, guest ...  Continue Reading