- April 17, 2015
Opinion: Executive Editor Eric Parizo says Microsoft's security strategy may have once been the benchmark for other vendors to emulate, but in 2015 the software giant's priorities lie elsewhere.
- October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
- October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
- October 13, 2010
Midsized firms are seeing increased attacks and a rise in data breaches, according to the survey conducted by London-based Bloor Research.
- July 08, 2010
Administrators can deploy a suite with full DLP inspection capabilities in 30 minutes, Websense said.
Sponsored by Splunk - DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More
Sponsored by CommVault - Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More
Sponsored by Splunk - The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More
Sponsored by CommVault - Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More
- June 29, 2010
McAfee fully integrates its acquisition of MX Logic, rolling out a cloud-based antimalware Web filtering service aimed primarily at small- and mid-sized -businesses.
- May 05, 2010
Microsoft's recent decision to not release Forefront Protection Manager will likely provide deployment benefits in the long run, but at least one midmarket pro will need to adjust to his new management console.
- April 28, 2010
A panel discussion at InfoSec World 2010 focused less on the technology necessary to secure non-BlackBerry devices and more on the attendees' concerns with the data privacy laws.
- April 21, 2010
During a session at InfoSec World 2010, a speaker urged companies to take advantage of the benefits of social networking but also address the risks in a security training program.
- April 20, 2010
NERC security officer Michael Assante said the national cybersecurity defense and threat strategy is a shared responsibility among today's corporate security professionals.
- March 23, 2010
First American Title Insurance Company cuts identity management user provisioning time from days to seconds with Microsoft Forefront Identity Manager 2010.
- March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
- March 03, 2010
After reading Joel Snyder's article on Active Directory backup strategies, a reader asked the author about the pros and cons of using ...
- January 26, 2010
Experts share lessons learned by midmarket companies trying to comply with PCI DSS in areas such as self assessment questionnaires, encryption, policy creation and application security
- December 03, 2009
Microsoft introduces the successor to the ISA Server, the Forefront Threat Management Gateway. TMG introduce Web security to the ISA line, which was long used as a proxy server.