Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
The value of booting from a VHD in Windows 7
Booting a system from a virtual hard drive is one of the perks of Windows 7. After reviewing the security benefits, Tony Bradley offers a step-by-step plan for creating a VHD. Continue Reading
How to set your baseline with host integrity monitoring software
Once you have your malware detection, IDS and network firewalls in place, it may be time to turn your attention to another valuable troubleshooting tool: host integrity monitoring software. Continue Reading
A closer look at Internet Explorer 8 security features
Tony Bradley explains why the security features in IE 8 may convince midmarket organizations to make the browser upgrade. Continue Reading
-
PCI DSS checklist: Mistakes and problem areas to avoid
Experts share lessons learned by midmarket companies trying to comply with PCI DSS in areas such as self assessment questionnaires, encryption, policy creation and application security Continue Reading
Secure data destruction using a bootable Windows CD
Tom Chmielarski reveals how one free, easy-to-use tool may be what prevents your valuable hard drive data from being sold on eBay. Continue Reading
First step in forensics: Create a bootable Windows environment CD
A bootable, clean operating system may come in handy when you need a secure environment to run AV or diagnose a system.Continue Reading
How to use Windows XP Mode in Windows 7
Your hardware or software may not be compatible with Windows 7. Contributor Tony Bradley reveals how to bridge the gap using Windows XP Mode virtualization.Continue Reading
Explore Web application security deployment best practices
Expert Rich Mogull of Securosis talks about the security risks and threats to Web applications in this podcast.Continue Reading
Understand role-based access control in Microsoft Exchange 2010
Role-based access control in Microsoft Exchange Server 2010 enforces the principle of least privilege, and allows companies to delegate email management efficiently.Continue Reading
Intelligent threat management podcast
Listen to this podcast featuring security guru Joel Snyder to find out how and where to spend your security dollars to make the most impact. Learn unique ways of leveraging existing threat management investments to provide more insight into your ...Continue Reading
-
Five NAC-like endpoint settings enforced with group policy
Complexity and cost may keep you from investing in NAC. Fear not, endpoint integrity enforcement, for example, can be achieved through directory group policies.Continue Reading
How to detect malicious insiders by monitoring antivirus log files
Antivirus logs can be a low-cost, low-effort approach for resource-strapped companies to look for threats posed by malicious insiders.Continue Reading
Take four steps toward Macbook security
Your organization may primarily be a Windows shop, but Macbooks are becoming popular among executives and Macintosh computer security must be understood.Continue Reading
Five things to do before your first PCI DSS compliance audit
Put these steps in motion before your organization's first PCI DSS compliance audit.Continue Reading
Windows Firewall with Advanced Security beefs up Windows 7 security
Windows Firewall with Advanced Security extends security to Windows 7 and Windows Server 2008 end users.Continue Reading