Email Alerts
-
Android security settings and controls for Android enterprise security
Can Androids ever be secure enough for corporate use? Learn about Android security controls to enable effective Android enterprise security. Tip
-
Windows vs. Mac security: An enterprise endpoint security comparison
Expert Mike Chapple explores the security implications of running Macs on the corporate network in a side-by-side comparison of Windows vs. Mac security. Tip
-
OS X antivirus software: Enterprise virus protection for the Mac
Macs should be protected against malware and unauthorized access just like their Windows counterparts. Learn how in this expert response. Answer
-
Malware on a Mac: How to implement a Mac antimalware program
Learn how to create a Mac security program at your enterprise, before the amount of Apple platform malware reaches critical mass. Tip
-
How to mitigate the risk of a TOCTTOU attack
Are TOCTTOU attacks, exploiting time-of-check-to-time-of-use race conditions, a threat to your enterprise file systems? Expert Michael Cobb discusses the dangers and how to mitigate them. Answer
-
Is full-disk server encryption software worth the resource overhead?
While encrypting production servers may seem like a good security move, according to Anand Sastry, doing so may not be worth the resources it uses. Answer
-
IE9 security, Apple security issues: Video with Gartner’s Neil MacDonald
In this video, Gartner’s Neil MacDonald discusses patch management, IE9 security, his Windows 8 security wish list and protecting Apple computers. Video
-
Attackers set sights on Mac OS X with Apple malware toolkit
A security team at CSIS Security Group discovered a crimeware toolkit targeting Mac OS X being sold on the black market. Researchers are also noting an increase in fake antivirus. News
-
Google acknowledges Android Trojan, takes security steps
The search engine giant said it would take steps to prevent additional malicious applications from using similar exploits from being distrusted via its Android Market. Article
-
Linux security best practices for Linux server systems
Linux servers are used throughout many enterprises, and their security posture shouldn't be overlooked. In this tip, King Ables discusses risk assessment pointers for Linux server systems. Tip
Security Management Strategies for the CIO