Email Alerts
-
Measuring the risk posed by sophisticated malware evasion techniques
Learn about the evolving nature of malware evasion techniques. Security expert Nick Lewis determines whether anti-malware tools should detect them. Answer
-
Exploit kits evolved: How to defend against the latest attack toolkits
Expert Nick Lewis details how automated exploit kits are evolving and offers mitigations for the latest methods employed by these attack toolkits. Tip
-
Microsoft offers 'fix' for latest Internet Explorer zero day
Microsoft released a temporary fix to mitigate attacks using the most recent Internet Explorer 8 zero day vulnerability. News
-
Choosing among antimalware products: Final considerations
Mike Rothman discusses important last-minute considerations when choosing among antimalware products from finalist antimalware vendors. Tip
-
Technical considerations for selecting the best antimalware technology
Mike Rothman discusses the evolution of malware and how today's antimalware products should handle detection and remediation. Tip
-
Antimalware software introduction: Business benefits and drawbacks
Mike Rothman discusses how antimalware software has evolved to develop various business and technology issues, but also still holds many benefits. Tip
-
The Red October malware campaign uncovered: What enterprises can learn
Expert Nick Lewis details the recently uncovered Red October malware campaign, plus the new and existing controls needed to thwart cyberespionage. Tip
-
Apple security update: Is it ready for the enterprise?
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior. Feature
-
Utilize the Blacksheep technique for rootkit detection, cleanup
Is the Blacksheep technique a legitimate enterprise option for rootkit detection and cleanup? Expert Nick Lewis discusses. Answer
-
The Narilam malware: How to protect SQL databases, corporate records
Expert Nick Lewis explains how the Narilam malware infects SQL databases and destroys corporate records, and offers advice on mitigation. Answer
Security Management Strategies for the CIO