New & Notable
Client security News
July 02, 2014
Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.
March 21, 2014
Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.
January 16, 2014
Software giant Microsoft will extend Windows XP antivirus updates past the XP end-of-life date, but security patches are still slated to end in April.
September 20, 2013
HP's new SureStart feature detects and 'heals' corrupted BIOS code.
Client security Get Started
Bring yourself up to speed with our introductory content
SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7... Continue Reading
Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor ... Continue Reading
A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used modifications such as capital letters, standard ... Continue Reading
Evaluate Client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. Continue Reading
Does the combination of the Trusted Platform Module and Windows 8 create the threat of a backdoor? Michael Cobb discusses. Continue Reading
More mobility means more endpoints to secure. This guide reviews the mobile security challenges and solutions enterprise security pros must consider. Continue Reading
Manage Client security
Learn to apply best practices and optimize your operations.
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
Expert Brad Casey offers a number of best practices to help your organization ensure network and endpoint security in a BYOPC era. Continue Reading
Readers vote on the top endpoint security products in 2013: Business-grade desktop and server antimalware and endpoint protection suites. Continue Reading
Problem Solve Client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security. Continue Reading
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises. Continue Reading
U.S.-based CounterTack in agreement to protect South Korean security firm SK Infosec's endpoints from increasingly stealthy cyberattacks. Continue Reading