New & Notable
Configuration Management Planning News
March 04, 2014
Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy.
February 04, 2013
Oracle has issued an update to Java two weeks ahead of the normal schedule.
September 29, 2012
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore.
January 16, 2012
While the RSA SecurID breach cost EMC’s security division more than $60 million, executives admit it could take years to restore its tarnished image.
Configuration Management Planning Get Started
Bring yourself up to speed with our introductory content
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files... Continue Reading
Evaluate Configuration Management Planning Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more. Continue Reading
Attacks on applications like Adobe Reader and Java require effective and timely patching of user systems. Continue Reading
Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Continue Reading
Manage Configuration Management Planning
Learn to apply best practices and optimize your operations.
Expert Michael Cobb discusses whether EMET configuration issues should deter a security team from pushing for an enterprise EMET deployment. Continue Reading
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process. Continue Reading
Utilize these five simple tips from expert Diana Kelley to improve your enterprise's threat and vulnerability management program. Continue Reading
Problem Solve Configuration Management Planning Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Does the latest Foxit Reader vulnerability mean it's time to find an alternative PDF reader? Expert Nick Lewis offers his advice. Continue Reading
Is the Blacksheep technique a legitimate enterprise option for rootkit detection and cleanup? Expert Nick Lewis discusses. Continue Reading
Expert Michael Cobb details how the Windows 8 ELAM feature can detect rootkits and other malicious drivers, help secure the Windows boot process. Continue Reading