Pass-the-hash (PtH) attacks have come to the forefront again. Read this white paper to learn about the mitigation strategies recommended by Microsoft and the NSA, and how two software solutions from Dell can help you implement those strategies.
Once a pariah in the enterprise, Apple has quietly emerged as a darling of executives and professionals because of the ease of use of the iPhone and the iPad. We look at how the influx of Apple devices is changing the tech landscape in business.
TechRepublic newsletters
Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!
No comments:
Post a Comment