Windows Security: Alerts, Updates and Best Practices News
March 05, 2015
The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.
January 19, 2015
For the third time in one month, Microsoft couldn't meet Google's 90-day public disclosure deadline, leading to Project Zero's disclosure, though experts say this Windows zero-day vulnerability may have little value to attackers.
December 09, 2014
Capping a busy year of software updates, Microsoft's December 2014 Patch Tuesday release delivers three critical bulletins; separately Adobe offers a pair of critical fixes.
November 18, 2014
Originally scheduled by Microsoft as part of its November Patch Tuesday release, the out-of-band patch resolves a serious security vulnerability in Kerberos.
Windows Security: Alerts, Updates and Best Practices Get Started
Bring yourself up to speed with our introductory content
Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk. Continue Reading
In a preview of Windows 10 security features, expert Michael Cobb discusses three improvements that will boost enterprise security. Continue Reading
Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory. Continue Reading
Evaluate Windows Security: Alerts, Updates and Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features and tools; Windows 8.1 is Microsoft's response. Windows 8.1 includes what is promised to be a less ... Continue Reading
With the release of Microsoft EMET 5.0 come new features and functionality. Michael Cobb explains what's new in the technical preview. Continue Reading
Continuing with Windows Server 2003 after its end-of-life date is a problem waiting to happen. Michael Cobb offers pointers on an upgrade. Continue Reading
Product ReviewsPowered by IT Central Station
I wouldn't consider this appropriate for fewer than around 2,000 users, unless you are synchronizing multiple databases.Powered by IT Central Station
Improvements to My Organization: To be honest - it hasn't. It was sold and installed for us at a large sum, with questionable implementations....Continue Reading
It has automated the entire user and group management process but more out of box connectors are needed.Powered by IT Central Station
Valuable Features: Synchronization End user functionality Portal Service Self service password reset Password management Password sync Group...Continue Reading
Powered by IT Central Station
It is unacceptable for an organisation not to have some form of Anti-virus protection these days. Symantec Endpoint Protection was a product I...Continue Reading
Manage Windows Security: Alerts, Updates and Best Practices
Learn to apply best practices and optimize your operations.
Outdated ActiveX controls can pose serious security risks. Enterprise threats expert Nick Lewis discusses how to block them in the enterprise. Continue Reading
In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8. Continue Reading
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security. Continue Reading
Problem Solve Windows Security: Alerts, Updates and Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised. Continue Reading
Ensuring BYOD access in an enterprise environment can be quite challenging, especially when it comes to balancing security with employee satisfaction. Learn about different Windows 8.1 features that can help ease the process. Continue Reading
Crash data from Windows Error Reporting can potentially help attackers conduct targeted attacks. Is the data a security vulnerability? Continue Reading