Tips
Tips
-
How to find a keylogger on your computers
If a hardware or software keylogger made it on to one of your organization's machines, it would be a security pro's worst nightmare. Learn how to detect and defend against the malware. Continue Reading
-
How to use BitLocker To Go in Windows 7: A primer
In this two part series, Phil Cox first reviews the features of BitLocker To Go in Windows 7. Continue Reading
-
Buying an IPS: Determine your form factor requirements
Your choice of either a standalone IPS appliance, or one integrated in a firewall, gives your different levels of functionality to consider as well. This is the fifth in a seven-part series. Continue Reading
-
Operating system comparison: The Windows OS security debate
The security debate between Linux, Mac OS X and Windows got even more heated when Google ended its internal use of Windows. Tom Chmielarski explains when an organization may (or may not) be ready for a change in operating systems. Continue Reading
-
How to avoid attacks that exploit a Web browser vulnerability
Beyond patching, Tom Chmielarski explains what you'll need to do to avoid application exploits caused by Web browser vulnerabilities. Continue Reading
-
What can the Khobe technique do to Windows antivirus software?
Khobe is an evasion technique, not malware. Learn how to stop a compromise and make sure that antivirus isn't your only line of defense. Continue Reading
-
Buying an IPS: Determine your performance requirements
Intrusion prevention system performance is dependant on many variables and how it is configured. Test with your network traffic before investing in an IPS. This is the fourth in a seven-part series. Continue Reading
-
How to use Windows Group Policy to secure and restrict USB devices
Learn how to use Windows GPOs take control of USB devices in your organization. Continue Reading
-
How to remove rootkits from your organization
Through their control of the underlying operating system, rootkits are often able to mask their presence from traditional antivirus software. What's a midsized business to do? Continue Reading
-
Which Windows malware tools are available to monitor a specific virus?
Tom Chmielarski reviews what you can use to see the changes that malware is making to your machines. Continue Reading
-
Are there options beyond a Windows XP SP2 upgrade?
If you're using 32-bit Windows, you have other options when Microsoft stops its support for machines running Windows XP SP2. Continue Reading
-
Windows patch deployment tools: WSUS 3.0 or third-party software?
Gregg Braunton discusses Windows patch deployment tools and reviews when you should (and should not) use WSUS to send updates to your employees' workstations. Continue Reading
-
Buying an IPS: Decide which applications and protocols your IPS will protect
Application and protocol coverage varies in signature-, rate- and behavior-based intrusion prevention systems. Understanding the differences is crucial to your IPS investments. This is the third in a seven-part series. Continue Reading
-
How to test Windows operating system patches
Windows patch testing may be easy when it comes to applications like Outlook. Tom Chmielarski reviews how to test more difficult updates to the operating system. Continue Reading
-
Laptop full disk encryption: Debunking myths
Mike Chapple reviews laptop full disk encryption and separates fact from fiction. Continue Reading