• Encryption

    My son tells me that my Charter.net email does not use encryption. Is this more common or less common? Lee

    autonut15 pointsBadges:
  • How is your company handling Cloud Email Security? Sandboxing?

    With the transition to cloud email services like Gmail or Office 365, IT departments are facing new security issues.  Has your company considered sandboxing your email client to lessen such security risks?

    Chris Leonard4,300 pointsBadges:
  • Is society prepared for a kinetic cyber attack?

    During this year's RSA Conference, security experts Ed Skoudis and Johannes Ullrich detailed how everything from an industrial control system to big financial institutions are vulnerable to a widespread cyber kinetic attack. Skoudis also expressed concerns that society continues to ignore the risks...

    Michael Tidmarsh30,910 pointsBadges:
  • Is Blackberry 10 the best choice for enterprise in terms of BYOD?

    Jeff Holleran, Blackberry's senior director of enterprise product management, claims that the new Blackberry 10 operating system in conjunction with the BlackBerry Enterprise Service 10 provides the best mobile and BYOD system for both owners and companies.  Do you think he’s right and do you...

    Chris Leonard4,300 pointsBadges:
  • Windows 7 and Kerberos

    I am looking for any documentation on deploying Windows 7 in a Single Sign-on(Kerberos) environment. Our XP's work fine, but cannot get a single sign-on connection using Windows 7, 64 bit. We already have Kerberos deployed and working.

    flsts20035 pointsBadges:
  • What’s a typical network design for a LAN with 5 Public IP’s for the FW, Router, Switches

    We are a small company that is planning to move all of our servers to a datacenter. We will have 5 routable Public IP's. We currently have the same at our office. Our current setup has a Comcast Business Gateway appliance with 3 FW's connected to it. Each of the FW's WAN port is set to one of our...

    milesmeridith5 pointsBadges:
  • What steps should the healthcare industry take to lessen the risks of security breaches?

    Along with former president Bill Clinton's keynote address, security will be headlining at HIMSS 2013. With healthcare being the most breached industry in 2011, experts will look at the various ways they can address the many risks. What steps should the industry take to lessen the risks of security...

    Michael Tidmarsh30,910 pointsBadges:
  • Open IT Forum: IT’s role in customer service

    One of ITKnowledgeExchange's bloggers is working on a series about customer service in the enterprise, and how it can be improved. From the IT side, do you have any experiences or suggestions for improving how companies do customer service? We'll take horror stories as well! Help a fellow IT...

    MelanieYarbrough6,345 pointsBadges:
  • Are you familiar with identity management systems?

    As BYOD becomes more prevalent, some companies have turned to identity management systems to safeguard data and employees. Are you aware of identity management systems? Has your company adopted such software tools?

    Chris Leonard4,300 pointsBadges:
  • Transfer coverage to another computer

    I have Norton for three computers and want to take it off one of them and put it on a new computer? Can I do this?

    Madned0 pointsBadges:
  • Cyber-squatting

    What exactly is cyber-squatting?

    Melware20 pointsBadges:
  • Is it possible to use the same SSL certificate in different windows server

    Is it possible to use the same SSL certificate in different Windows Server. I have an URL (abc.mydomain.com) it is configured in two web servers. These two web servers are hosted in different windows server. In such cases, how may certificates should I order?

    santtomcat90 pointsBadges:
  • What types of Layer 4 (L4) or transport layer switch exist?

    How many kinds of Layer 4 switches are there?

    NetworkingATE1,545 pointsBadges:
  • Where can I find network diagrams of Layers 1-7?

    Where can one find Layer 1, Layer 2, Layer 3, etc. network diagrams? It seems that different companies have different ideas of what should be displayed in each diagram. Is there a uniform book with clear samples that one can follow?

    NetworkingATE1,545 pointsBadges:
  • Antivirus for external hard disk

    I have 1TB external HDD. I want to know if it is possible to install any antivirus in my external hard drive because I might plug it in another computer that doesn't have an update and that has a virus. Which one is good antivirus for external hard drive?

    pdsathishkumar3,790 pointsBadges:
  • Project Tools For Risk

    Good evening folks, recently I have tested out a risk management software tool and was wondering if there are any more?

    rogerblackwell150 pointsBadges:
  • Why use Layer 3 switches and how do they differ from Layer 2 switches?

    Why do we use Layer 3 (L3) switches, and how are they different from Layer 2 (L2) switches?

    NetworkingATE1,545 pointsBadges:
  • How can I keep a Windows folder from being moved accidentally

    Is it possible to lock down the folders (or directories) within Windows, so they can't be accidentally dragged and dropped into some unknown location? With multiple users using the same files, we are finding that the Windows folders are disappearing. I was wondering if there is a way of locking the...

    Jbercsik5 pointsBadges:
  • What impact will President Obama’s cybersecurity order have on the industry?

    President Obama issued his long awaited Cybersecurity executive order which is aimed at improving public-private information sharing. However, many skeptics believe this order won't get anything done. Do you think Obama's executive order will go through? What impact will it have on the...

    Michael Tidmarsh30,910 pointsBadges:
  • What security trend worries you the most for 2013?

    According to a recent TechTarget survey, compliance, viruses and mobile were among the top security priorities for respondents and their companies in 2013. What security trend worries you the most in 2013? Will companies see an increase in cyber attacks this year?

    Michael Tidmarsh30,910 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following