Neil Roiter TechTarget - SearchSecurity Neil Roiter is the former Senior Technology Editor for Information Security magazine. Neil Roiter’s Most Recent Content SearchMidmarketSecurity Security mergers and acquisitions strategy: Questions you need to ask 29 Mar 2010 SearchMidmarketSecurity Considering two-factor authentication? Do cost, risk analysis 08 Mar 2010 SearchITChannel Social networking security still a gray area for some customers 02 Feb 2010 SearchCompliance PCI DSS checklist: Mistakes and problem areas to avoid 26 Jan 2010 ComputerWeekly.com Windows 7 security: the new Windows Firewall with Advanced Security 20 Nov 2009 SearchMidmarketSecurity Windows Firewall with Advanced Security beefs up Windows 7 security 18 Nov 2009 SearchWindowsServer Should you disable IE ESC, or manage it in Windows servers? 05 Oct 2009 SearchMidmarketSecurity How to choose full disk encryption for laptop security, compliance 24 Sep 2009 ComputerWeekly.com To secure SharePoint, make sure you get user authorization and user management right 10 Sep 2009 ComputerWeekly.com How to devise great permissions policies for SharePoint 09 Sep 2009 SearchMidmarketSecurity Microsoft SharePoint security hinges on authorization, external user management 28 Aug 2009 SearchMidmarketSecurity Poor Microsoft SharePoint security permissions policies can derail deployments 26 Aug 2009 SearchITChannel How to build the right managed security service level agreement 06 Aug 2009 SearchMidmarketSecurity Web application firewall worth depends on developer efforts 26 Jun 2009 SearchMidmarketSecurity Next version of Microsoft ISA Server brings Web security to midmarket 10 Mar 2009 SearchSecurity SSLstrip hacking tool bypasses SSL to trick users, steal passwords 18 Feb 2009 SearchSecurity Data masking hides information from testers 09 Dec 2008 SearchSecurity Perimeter eSecurity acquisition shapes managed security services 12 Jun 2008 ComputerWeekly.com A new take on network security 05 Dec 2007 SearchSecurity Cisco injects role-based access control into the network 05 Dec 2007 ComputerWeekly.com NAC switches, appliances help track users, malware 16 Sep 2007 ComputerWeekly.com NAC switches, appliances help track users, malware 05 Sep 2007 ComputerWeekly.com Compliance, data breaches heighten database security needs 17 Aug 2007 ComputerWeekly.com Web security gateways meet rising malware threats 12 Jul 2007 ComputerWeekly.com Springing leaks: Getting smart about data loss prevention 01 Jun 2007 ComputerWeekly.com When signature based antivirus isn't enough 16 May 2007 ComputerWeekly.com FMC: new opportunities but security headaches 29 Mar 2007 SearchSecurity IPSec best practices to secure IP-based storage systems 01 Jul 2003 SearchSecurity How a computer forensics investigation put two behind bars 01 Apr 2002