- April 17, 2015
Opinion: Executive Editor Eric Parizo says Microsoft's security strategy may have once been the benchmark for other vendors to emulate, but in 2015 the software giant's priorities lie elsewhere.
- October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
- October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
- October 13, 2010
Midsized firms are seeing increased attacks and a rise in data breaches, according to the survey conducted by London-based Bloor Research.
- July 08, 2010
Administrators can deploy a suite with full DLP inspection capabilities in 30 minutes, Websense said.
Sponsored by Splunk - The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More
Sponsored by Palo Alto - Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More
Sponsored by Splunk - Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More
Sponsored by Palo Alto - In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More
- June 29, 2010
McAfee fully integrates its acquisition of MX Logic, rolling out a cloud-based antimalware Web filtering service aimed primarily at small- and mid-sized -businesses.
- May 05, 2010
Microsoft's recent decision to not release Forefront Protection Manager will likely provide deployment benefits in the long run, but at least one midmarket pro will need to adjust to his new management console.
- April 28, 2010
A panel discussion at InfoSec World 2010 focused less on the technology necessary to secure non-BlackBerry devices and more on the attendees' concerns with the data privacy laws.
- April 21, 2010
During a session at InfoSec World 2010, a speaker urged companies to take advantage of the benefits of social networking but also address the risks in a security training program.
- April 20, 2010
NERC security officer Michael Assante said the national cybersecurity defense and threat strategy is a shared responsibility among today's corporate security professionals.
- March 23, 2010
First American Title Insurance Company cuts identity management user provisioning time from days to seconds with Microsoft Forefront Identity Manager 2010.
- March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
- March 03, 2010
After reading Joel Snyder's article on Active Directory backup strategies, a reader asked the author about the pros and cons of using ...
- January 26, 2010
Experts share lessons learned by midmarket companies trying to comply with PCI DSS in areas such as self assessment questionnaires, encryption, policy creation and application security
- December 03, 2009
Microsoft introduces the successor to the ISA Server, the Forefront Threat Management Gateway. TMG introduce Web security to the ISA line, which was long used as a proxy server.