New & Notable
Microsoft security threat management News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
October 13, 2010
Midsized firms are seeing increased attacks and a rise in data breaches, according to the survey conducted by London-based Bloor Research.
August 02, 2010
Critical update comes a week ahead of Microsoft's regular Patch Tuesday, amid increased malware attacks.
Microsoft security threat management Get Started
Bring yourself up to speed with our introductory content
Evaluate Microsoft security threat management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are you preparing for a Windows 7 upgrade? Our latest learning guide reviews the new and improved security features of the new and improved operating system. Continue Reading
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Continue Reading
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ... Continue Reading
Manage Microsoft security threat management
Learn to apply best practices and optimize your operations.
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading
There's no one-size-fits-all approach for deciding when a patch needs testing. Tom Chmielarski shares his thoughts on an ideal patch management process. Continue Reading
Microsoft's recent decision to not release Forefront Protection Manager will likely provide deployment benefits in the long run, but at least one midmarket pro will need to adjust to his new management console. Continue Reading
Problem Solve Microsoft security threat management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When attackers inject malicious code into an application, Microsoft's Data Execution Prevention (DEP) technique can thwart the attack and save the day. But expert Tom Chmielarski says DEP does have some limitations. Continue Reading
Windows 7's built-in backup tool is a reliable options for smaller organizations wanting to preserve the confidentiality and availability of stored data. Continue Reading
Even though it's a consumer offering, the free Microsoft Security Essentials 2.0 endpoint security software may be a perfect fit for many midmarket firms. Robbie Higgins explains why. Continue Reading