Windows Security: Alerts, Updates and Best Practices News
April 17, 2015
Opinion: Executive Editor Eric Parizo says Microsoft's security strategy may have once been the benchmark for other vendors to emulate, but in 2015 the software giant's priorities lie elsewhere.
March 05, 2015
The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.
January 19, 2015
For the third time in one month, Microsoft couldn't meet Google's 90-day public disclosure deadline, leading to Project Zero's disclosure, though experts say this Windows zero-day vulnerability may have little value to attackers.
December 09, 2014
Capping a busy year of software updates, Microsoft's December 2014 Patch Tuesday release delivers three critical bulletins; separately Adobe offers a pair of critical fixes.
Windows Security: Alerts, Updates and Best Practices Get Started
Bring yourself up to speed with our introductory content
Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk. Continue Reading
In a preview of Windows 10 security features, expert Michael Cobb discusses three improvements that will boost enterprise security. Continue Reading
Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory. Continue Reading
Evaluate Windows Security: Alerts, Updates and Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft hardened its Windows 8.1 update to make it enterprise- and government-worthy. Expert Michael Cobb outlines the new and improved features. Continue Reading
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features and tools; Windows 8.1 is Microsoft's response. Windows 8.1 includes what is promised to be a less ... Continue Reading
With the release of Microsoft EMET 5.0 come new features and functionality. Michael Cobb explains what's new in the technical preview. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: Having experienced the frustrations of poorly designed/executed interfaces first-hand, one of the most valuable features for...Continue Reading
The way that it automates the provisioning of accounts is valuable but there were some deployment issues.Powered by IT Central Station
Valuable Features: The way that it automated the provisioning of accounts for employees and students and the quick response time. •...Continue Reading
I wouldn't consider this appropriate for fewer than around 2,000 users, unless you are synchronizing multiple databases.Powered by IT Central Station
Improvements to My Organization: To be honest - it hasn't. It was sold and installed for us at a large sum, with questionable implementations....Continue Reading
Manage Windows Security: Alerts, Updates and Best Practices
Learn to apply best practices and optimize your operations.
Outdated ActiveX controls can pose serious security risks. Enterprise threats expert Nick Lewis discusses how to block them in the enterprise. Continue Reading
In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8. Continue Reading
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security. Continue Reading
Problem Solve Windows Security: Alerts, Updates and Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised. Continue Reading
Ensuring BYOD access in an enterprise environment can be quite challenging, especially when it comes to balancing security with employee satisfaction. Learn about different Windows 8.1 features that can help ease the process. Continue Reading
Crash data from Windows Error Reporting can potentially help attackers conduct targeted attacks. Is the data a security vulnerability? Continue Reading