Finding the right "un-authentication" system

09/28/2009 | ThreatPost.com

Office computers are often left running when users leave their desks, making them vulnerable to security threats, writes Bruce Schneier. Finding the best "un-authentication" system for a network comes down to balancing the organization's security needs against the users' tolerance for inconvenience, he notes.

View Full Article in:

ThreatPost.com

Published in Brief:

SmartBrief Job Listings for Business

Job Title Company Location
VP of Video Content Distribution
Calkins Media
Levittown, PA
Administrative Assistant
Watco Companies
Los Angeles, CA