Email Alerts
-
Antivirus engines: Lessons learned from the Tavis Ormandy Sophos research
Learn how the discovery of several flaws in the Sophos antivirus engine can help advance the state of antimalware software. Tip
-
Windows vs. Mac security: An enterprise endpoint security comparison
Expert Mike Chapple explores the security implications of running Macs on the corporate network in a side-by-side comparison of Windows vs. Mac security. Tip
-
iPad security policy pointers for enterprise iPad endpoint integrity
As enterprise iPad use increases, companies must make decisions about iPad security policy and how to enforce it. Lisa Phifer offers several tactics for ensuring iPad endpoint integrity. Tip
-
Creating a network endpoint security policy for hostile endpoints
The plethora of IP-enabled devices available today makes it harder to discern a friendly endpoint from a hostile one. Learn how to create an endpoint security policy for non-corporate-owned devices. Tip
-
How to keep networks secure when deploying an 802.11n upgrade
Before you upgrade to 802.11n, Lisa Phifer has seven questions that every network security pro should consider. Tip
-
How to defend against rogue DHCP server malware
Rogue DHCP server malware is a new twist on an old concept. The good news is that effective threat mitigation strategies exist; the bad news is that many organizations haven't bothered to deploy them. Tip
-
Three ways to prioritize endpoint security over perimeter defenses
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Tip
-
How to find sensitive information on the endpoint
Worried that your enterprise endpoints may be harboring sensitive information like credit card numbers or Social Security numbers? Fear not. Mike Chapple offers algorithms and tools to conduct a search and advice on dealing with the results. Tip
-
Hidden endpoints: Mitigating the threat of non-traditional network devices
Organizations have many safeguards in place for network-enabled devices like PCs and servers, but few realize the threat posed by non-traditional devices like printers, physical access devices and even vending machines. Endpoint security expert Mark ... Tip
-
Exploring enterprise policy management options
Policy management offers the ability to enforce enterprise-wide access policies, regardless of particular applications. Although Microsoft provides management capabilities via Group Policy and Active Directory, many endpoint security suites also offe... Tip
Security Management Strategies for the CIO