John Howie


John Howie is the Chief Operating Officer of the Cloud Security Alliance. He is also a visiting professor at the University of Arizona and at Edinburgh Napier University.

The Inevitability of IPv6, Part 1
Learn about some of the new features of IPv6, as well as some of the reasons you should care about it—even if you don't plan on implementing it in the near future.
Microsoft Forefront Security for Exchange Server
Forefront for Exchange is designed to overcome the limitations of any one email server antivirus product by running up to five antivirus engines simultaneously. See how to set up and manage Forefront on Exchange 2007 servers that host mailboxes.
Microsoft Office SharePoint Server 2007 and RMS 2
MOSS's Information Rights Management (IRM) feature gives administrators and users control over how others can use Office files within SharePoint and after they're downloaded.
Enterprise Event Logging for SMBs
These event log collection and management tools might have been designed as enterprise solutions, but SMBs with extensive logging needs will want to explore these products.
Toughening Up Virtual Server 1
Are you about to jump on the virtualization bandwagon? Before you do, you need to be aware of the technology's real security concerns. Here are some practical solutions that you can use.
MOM Management Packs
MOM provides a powerful way to monitor your servers and business-critical infrastructure. Management packs for MOM let you monitor a wide range of server-health indicators and alert you to critical events that require intervention.
MOM for SMBs
MOM 2005 Workgroup Edition is designed for use in networks with up to 10 servers. Here's how to prepare for, install, and use it.
Secure VPN Alternatives 1
VPNs will always have a place in some companies, but here are some alternatives that provide more security.
Security Log Collection 1
Select the right security log management tool for your company.
When You Must Use Passwords
Use these guidelines in situations in which you must use passwords for authentication.
Authentication Options 1
The problems associated with using usernames and passwords for authentication are causing many companies to search for alternative authentication methods. Here are three options.
Windows Server 2003 Certificate Services - 26 May 2006
Windows Server 2003 Certificate Services contains new features and improved security. Three key new features are Version 2 certificate templates, key archival and recovery, and delta Certificate Revocation Lists (CRLs).
Reaping the Benefits of WPA and PEAP 3
Learn about the benefits and configuration steps for securing your wireless networks by using WPA or WPA2 technology.
Securing Networks with WPA-PSK and WPA2-PSK 2
Learn the steps for securing your wireless networks via WPA or WPA2 and Pre-Shared Key technology.
Collecting and Analyzing Event and System Logs
Use EventCombMT to collect event and system logs from multiple remote locations.
John Savill Windows 10 Training

Developing and Implementing a Windows 10 Business Strategy​
Live Online Training on Tuesday, October 25th 
Register by October 19th and Save 15%!

Many organizations today are exploring adoption of Windows 10. Often touted as the last version of Windows, it is now a constantly evolving Windows as a Service solution. In this one-day training, you'll find out what this new model for Windows really means to your organization and what the benefits are once you've made the move to Windows 10.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×