Yes, it's possible to do a Microsoft Exchange Server deployment that is secure enough for all but the most sensitive information. Here's how to do it. With all the news about information leaks, ...
As your business grows, you may find that your Web serving needs quickly outpace simple single-server arrangements. If that's the case, you need to start planning a server farm. Part of that planning ...
Hewlett Packard Enterprise Co. is addressing the growing demands of AI, cloud-native applications and evolving security threats with the launch of its latest generation of compute solutions. The HPE ...
Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, ...
As locking down information becomes a more critical priority for IT organizations, securing individual files or shares is completely dependent on effectively setting up security groups. Because ...
Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
Please refer to the University of Colorado’s Administrative Policy Statement (APS) 6005 IT Security Program and System-wide Baseline Security Standards which apply to all individuals who access or ...
In my last article, I started a series on some of the challenges related to spawning secure servers on Amazon EC2. In that column, I discussed some of the overall challenges EC2 presents for security ...