Email Alerts
-
Quiz: Reinventing defense in depth
This quiz is part of SearchSecurity.com’s Intrusion Defense Security School lesson, Reinventing defense in depth. Reinforce your knowledge of the key concepts of this lesson by taking the five-question quiz below. Quiz
-
CISSP Essentials training: Domain 10, Operations Security
Discover everything you need to know to ace the CISSP® exam with our first series of SearchSecurity.com Security School webcasts focused on CISSP training. Each lesson corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge... Security School
-
Protection Mechanisms
Security Architectural Mo
-
The Protection Process
Security Architectural Mo
-
Technical Security Architecture
Security Architectural Mo
-
SecurityEXPERT eases device configuration but requires the UpdateEXPERT patching tool
Learn how St. Bernard's SecurityEXPERT automates deployment and enforcement of strong security configurations across Windows and Unix devices, based on industry best practices. However, it lacks customized reporting and requires the UpdateEXPERT patc... Review
-
Review: Configuresoft ECM 4.5 prevents security configuration errors
Review: Configuresoft ECM 4.5 improves security and automated compliance by preventing common configuration errors. Feature
-
Case Study: US supermarket chain solves security challenge virtually
A US supermarket chain has implemented an endpoint security system to secure legacy applications and to save additional development Case Study | 30 May 2013
-
Oracle issues out-of-band patch to repair 50 Java vulnerabilities
Oracle has issued an update to Java two weeks ahead of the normal schedule. News | 04 Feb 2013
-
Internet scan finds thousands of device flaws, system weaknesses
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore. News | 29 Sep 2012
-
RSA SecurID breach: Executives attempt to repair tarnished image
While the RSA SecurID breach cost EMC’s security division more than $60 million, executives admit it could take years to restore its tarnished image. News | 16 Jan 2012
-
Critical Windows 7 zero-day vulnerability could lead to iFrame attacks
Danish vulnerability clearinghouse Secunia is warning of a highly critical memory corruption zero-day vulnerability that could be targeted by attackers. Proof-of-concept code has been published. News | 20 Dec 2011
-
IT security pros acknowledge network security weaknesses, configuration issues
Improperly configured network devices and the inability to measure the network security posture make most IT organizations incapable of finding gaps in their systems, according to a new survey. News | 13 Oct 2011
-
NIST guidelines seek to minimize risk of BIOS attacks
Amid emerging attack methods and the rollout of a new generation of BIOS, NIST offers guidelines to help enterprises reduce the risk of BIOS attacks. News | 21 Sep 2011
-
Maiffret: Configuration changes, attack mitigation can reduce attack surface
A new report produced by noted security researcher Marc Maiffret outlines free steps companies can take to greatly reduce the attack surface. News | 05 May 2011
-
LANDesk Software acquired by private equity firm
Thoma Bravo said it signed an agreement to buy LANDesk Software from Emerson Electric to further build out its security market portfolio. Article | 23 Aug 2010
-
EMC adds configuration management with Configuresoft acquisition
EMC said it would move Configuresoft into its Resource Management Software Group. The software could detect configuration changes in both virtual and physical environments. Article | 27 May 2009
- See more News on Configuration Management Planning
-
Five tips to improve a threat and vulnerability management program
Utilize these five simple tips from expert Diana Kelley to improve your enterprise's threat and vulnerability management program. Tip
-
NMAP NSE tutorial: Network asset and vulnerability identification
In this screencast, expert Mike McLaughlin offers an NMAP NSE tutorial for enterprise network asset and vulnerability identification. Tip
-
Best practices for enterprise database compliance
Successful enterprise database compliance means, for starters, access must be tightly controlled and monitored. Charles Denyer covers key database compliance essentials. Tip
-
2006 Products of the Year: Vulnerability management
We asked. You answered. Here are your choices for best vulnerability management product of the year. Tip
-
Configuresoft's Enterprise Configuration Manager v4.7
Information Security magazine's contributing editor, Mike Chapple, reviews Configuresoft's Enterprise Configuration Manager v4.7. Tip
-
Five ways to simplify the vulnerability management lifecycle
Learn how to quickly and accurately quantify your exposure, communicate that exposure and deploy resources to remediate. Tip
-
Quiz: Vulnerability management
Test your knowledge of vulnerability management process and methodology with this quiz by Shon Harris, CISSP. Tip
-
Products of the Year: Vulnerability management
Information Security magazine unveils its best vulnerability management products of 2005. Tip
-
Week 19: Configuration Management (CM)
In this week's column, Bard offers some tips on configuration management. Tip
-
Security templates -- the key to simplified deployment
Security templates could be the key to simplifying security deployments. Tip
- See more Tips on Configuration Management Planning
-
Foxit Reader vulnerability: Time to find an alternative PDF reader?
Does the latest Foxit Reader vulnerability mean it's time to find an alternative PDF reader? Expert Nick Lewis offers his advice. Answer
-
Advocating for a Microsoft EMET deployment amid configuration issues
Expert Michael Cobb discusses whether EMET configuration issues should deter a security team from pushing for an enterprise EMET deployment. Answer
-
Utilize the Blacksheep technique for rootkit detection, cleanup
Is the Blacksheep technique a legitimate enterprise option for rootkit detection and cleanup? Expert Nick Lewis discusses. Answer
-
Utilize Windows 8 ELAM to secure the boot process, detect rootkits
Expert Michael Cobb details how the Windows 8 ELAM feature can detect rootkits and other malicious drivers, help secure the Windows boot process. Answer
-
Assessing the impact of a Windows 8 bootkit on UEFI security
With the release of a proof-of-concept bootkit for the Windows 8 platform, expert Michael Cobb assesses the potential threat to UEFI security. Answer
-
BIOS security: Are BIOS attacks worth defending against?
Expert Nick Lewis analyzes the risk of a BIOS attack in juxtaposition to the irritation and expense of securing a network against this threat. Answer
-
How to bolster BIOS security to prevent BIOS attacks
BIOS attacks can be thwarted by implementing NIST guidelines for BIOS security. Answer
-
Is laptop remote wipe needed for effective laptop data protection?
Expert Michael Cobb explains how laptop remote wipe technology can ease data loss fears, but shouldn’t be solely relied upon. Answer
-
How does 'arbitrary code' exploit a device?
Ask the Expert
-
Corporate antivirus benchmarks
Ask the Expert
- See more Expert Advice on Configuration Management Planning
-
policy server
A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files... Definition
-
How to use ThreadFix to simplify the vulnerability management process
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process. Screencast
-
Vulnerability researcher on layered security plan mistakes
A layered security plan is good, but Argonne National Laboratory vulnerability researcher Roger Johnston warns against too many layers. Video
-
Default deny security: How to implement a positive security model
What is 'default deny' security? How difficult is the implementation process, and how could you sell it to executives? In this video, expert Mike Rothman explains how a positive security model works and how to decide if it's right for your enterprise... Video
-
Foxit Reader vulnerability: Time to find an alternative PDF reader?
Does the latest Foxit Reader vulnerability mean it's time to find an alternative PDF reader? Expert Nick Lewis offers his advice. Answer
-
Advocating for a Microsoft EMET deployment amid configuration issues
Expert Michael Cobb discusses whether EMET configuration issues should deter a security team from pushing for an enterprise EMET deployment. Answer
-
How to use ThreadFix to simplify the vulnerability management process
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process. Screencast
-
Case Study: US supermarket chain solves security challenge virtually
A US supermarket chain has implemented an endpoint security system to secure legacy applications and to save additional development Case Study
-
Utilize the Blacksheep technique for rootkit detection, cleanup
Is the Blacksheep technique a legitimate enterprise option for rootkit detection and cleanup? Expert Nick Lewis discusses. Answer
-
Utilize Windows 8 ELAM to secure the boot process, detect rootkits
Expert Michael Cobb details how the Windows 8 ELAM feature can detect rootkits and other malicious drivers, help secure the Windows boot process. Answer
-
Assessing the impact of a Windows 8 bootkit on UEFI security
With the release of a proof-of-concept bootkit for the Windows 8 platform, expert Michael Cobb assesses the potential threat to UEFI security. Answer
-
Oracle issues out-of-band patch to repair 50 Java vulnerabilities
Oracle has issued an update to Java two weeks ahead of the normal schedule. News
-
Five tips to improve a threat and vulnerability management program
Utilize these five simple tips from expert Diana Kelley to improve your enterprise's threat and vulnerability management program. Tip
-
Internet scan finds thousands of device flaws, system weaknesses
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore. News
- See more All on Configuration Management Planning
About Configuration Management Planning
Configuration management and configuration management databases (CMDBs) have quickly become indispensable tools for security professionals. Get the latest news and tactics on the configuration management process, tools and software.
Security Management Strategies for the CIO