New & Notable
Microsoft security threat management News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
August 02, 2010
Critical update comes a week ahead of Microsoft's regular Patch Tuesday, amid increased malware attacks.
March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
Microsoft security threat management Get Started
Bring yourself up to speed with our introductory content
Evaluate Microsoft security threat management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are you preparing for a Windows 7 upgrade? Our latest learning guide reviews the new and improved security features of the new and improved operating system. Continue Reading
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Continue Reading
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ... Continue Reading
Manage Microsoft security threat management
Learn to apply best practices and optimize your operations.
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading
There's no one-size-fits-all approach for deciding when a patch needs testing. Tom Chmielarski shares his thoughts on an ideal patch management process. Continue Reading
Phil Cox reviews how to allow your remote users to access RMS-protected documents. Continue Reading
Problem Solve Microsoft security threat management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When attackers inject malicious code into an application, Microsoft's Data Execution Prevention (DEP) technique can thwart the attack and save the day. But expert Tom Chmielarski says DEP does have some limitations. Continue Reading
Windows 7's built-in backup tool is a reliable options for smaller organizations wanting to preserve the confidentiality and availability of stored data. Continue Reading
Even though it's a consumer offering, the free Microsoft Security Essentials 2.0 endpoint security software may be a perfect fit for many midmarket firms. Robbie Higgins explains why. Continue Reading