Security Unified threat management:
Intrusion Defense School
Unified threat management
In this lesson, learn about the basics of unified threat management as it pertains to intrusion defense and network perimeter security.
Find best practices for improving your network monitoring strategy and learn how to simplify network management, prevent intrusions and improve visibility with monitoring switches.Click Here
A verification flaw in the synchronization service of iCloud Keychain enables attackers to intercept the data it transfers. Expert Frank Siemons explains what to do about it.
Microsoft SRD is a new cloud service that aims to detect vulnerabilities in software using artificial intelligence. Expert Dave Shackleford explains what that means.
Enterprises can benefit from cloud features such as rapid elasticity and measured services, but they bring new security risks with them. Expert Matthew Pascucci explains.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Expert Nick Lewis details how automated exploit kits are evolving and offers mitigations for the latest methods employed by these attack toolkits.
A survey released by WhiteHat Security finds that website vulnerabilities have decreased steadily in recent years, though problems persist.
There's no place to hide as new cyberthreats and tried-and-true hacking techniques test security teams.
Learn how security big data initiatives support enterprise information security and how to prepare for a big data collection implementation.
A new URL generation algorithm and domain obfuscation are among the new features designed to trip up malware analysis and avoid detection.
Hat Trick ditches industry-specific hardware and deploys Black Pearl, which gives NAS-like file access from tape
Transport for London has rejected Uber's application for its licence renewal, citing a lack of corporate responsibility as the reason
Businesses view cyber security as a way to provide new opportunities and improve customer loyalty, according to a Vodafone report