By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Configuration Management Planning News
May 13, 2016
DHS US-CERT warns of a patched SAP Java vulnerability from 2010 that has enabled breaches at three dozen global enterprises due to configuration issues.
March 04, 2014
Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy.
February 04, 2013
Oracle has issued an update to Java two weeks ahead of the normal schedule.
September 29, 2012
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore.
Configuration Management Planning Get Started
Bring yourself up to speed with our introductory content
Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files... Continue Reading
Evaluate Configuration Management Planning Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
See what a vulnerability management tool is, how it can help your company mitigate risk and remain compliant, and which vendors best match your company's needs. Continue Reading
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more. Continue Reading
Attacks on applications like Adobe Reader and Java require effective and timely patching of user systems. Continue Reading
Manage Configuration Management Planning
Learn to apply best practices and optimize your operations.
Flawed machine learning models lead to failures and user interruptions. Expert Judith Myerson explains the causes for failures and how a failover plan can improve user experience. Continue Reading
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
Expert Michael Cobb discusses whether EMET configuration issues should deter a security team from pushing for an enterprise EMET deployment. Continue Reading
Problem Solve Configuration Management Planning Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows 10 may be the most secure Windows ever, but expert Ed Tittel explains how to use Windows hardening techniques to make systems even more secure. Continue Reading
Does the latest Foxit Reader vulnerability mean it's time to find an alternative PDF reader? Expert Nick Lewis offers his advice. Continue Reading
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process. Continue Reading