Security Solutions The Strands of Your Identity Web | One of the challenges that identity professionals face is that they rarely have to deal with just one identity system, such as Active Directory (AD). No, there's usually quite a collection of systems that provide identity inside your company, and often part of your job is to somehow tie all these systems together in some coherent manner for your applications to use. Read More... | ADVERTISEMENT Innovative Ways to Improve Software Quality & Development Agility Technologies that could help your company enable continuous integration testing of heterogeneous environments. Check out this brief webcast today! | Security News and Features Using Transparent Data Encryption | Securing sensitive data is a critical concern for organizations of all types and sizes. Credit card numbers, medical and health records, and other personal information must be stored and secured in such a way that only authorized personnel are able to access the information. Before SQL Server 2008, this type of encryption needed to be handled by the application. Managing the encryption keys was a manual process, and accessing the encrypted data required writing application code. SQL Server 2008 addressed these issues by bringing the ability to encrypt data into the database engine itself with its Transparent Data Encryption (TDE) technology. Read More... | With the splash down earlier this month of the Dragon capsule from SpaceX corporation, we herald in a new era of private competition in the space race. SpaceX, a startup funded by Paypal billionaire Elon Musk managed to do what only three countries have done before; send a vehicle to the International Space Station. The mission was to resupply it, but within a year or so, they hope to be sending astronauts rather than just payloads. I felt a brief moment of hopefulness in our nation's potential. Perhaps we could once again be the leader in this human condition changing field, using the power of private enterprise and entrepreneurship. During the launch, which I had the privilege of being present at, they had dual live video feeds of the both controls rooms, NASA and SpaceX. Read More... | Give and Take Q: What is the goal of the UAC security feature that Microsoft introduced in Windows Vista? | A: User Account Control (UAC) is a Windows security feature that automatically informs you when you're about to start a program that requires administrator-level permissions or when a program wants to make a change that requires administrator-level permissions. Under the hood, UAC controls the permission level of your user account. UAC always tries to let you do your routine Windows work -- such as reading email, creating documents, and surfing the web -- as a standard -- that is, a non-privileged or non-administrator -- user, even if you're logged on as an administrator. Read More... | Share your security-related tips, comments, or problems and solutions. Email your contributions to r2r@windowsitpro.com. If we print your submission, you'll get $100. We edit submissions for style, grammar, and length. | Additional Resources | |
|