Many Web filtering gateways can block these applications. As an additional layer of precaution, I also recommend...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
application control (white lists) to be integrated into the client security layer to make sure that malware can't execute if a user navigates to a bad site.
For more information:
Dig Deeper on Information Security Policies, Procedures and Guidelines
Related Q&A from Mike Rothman
In the world of security certifications, what is the GISP and how alike is it to the CISSP? In this security management expert response, learn about ...continue reading
Depending on your enterprise, it may or may not be necessary to utilize a QSA. In this security management expert response, learn how to determine ...continue reading
When developing software securely, what role does gap analysis play? In this security management expert response, learn how to implement gap analysis...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.