Windows Security: Alerts, Updates and Best Practices News
August 07, 2015
News roundup: ICANN confirmed its members' credentials were stolen Wednesday, forcing the nonprofit to enforce a site-wide password reset. Plus: VPN provider being used for APTs; Thunderstrike strikes again; Windows 10 security in its first week.
June 26, 2015
New roundup: Sometimes the least of threats -- such as click fraud -- can end up being the bigger issues -- like ransomware. Plus: U.S. Navy won't let go of XP; U.S./China cyber code of conduct; and more!
May 15, 2015
News roundup: Microsoft released security details of its new Edge browser, but is enough to restore user confidence? Plus: Millennial security threats; new ransomware, GPU-based malware; black hat cybersecurity services.
April 21, 2015
Runtime application self-protection startup Waratek wins coveted RSA Innovation award.
Windows Security: Alerts, Updates and Best Practices Get Started
Bring yourself up to speed with our introductory content
Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk. Continue Reading
In a preview of Windows 10 security features, expert Michael Cobb discusses three improvements that will boost enterprise security. Continue Reading
Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory. Continue Reading
Evaluate Windows Security: Alerts, Updates and Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft is ending support for Windows Server 2003 in July 2015, yet many organizations will still run W2K3 beyond this date. Learn how to keep your enterprise safe. Continue Reading
Microsoft hardened its Windows 8.1 update to make it enterprise- and government-worthy. Expert Michael Cobb outlines the new and improved features. Continue Reading
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features and tools; Windows 8.1 is Microsoft's response. Windows 8.1 includes what is promised to be a less ... Continue Reading
Product ReviewsPowered by IT Central Station
My customers are always impressed by its central management, reporting, and options to do more. But, the policies and rules at deployment take time if you don't know the product.Powered by IT Central Station
Valuable Features: The central management solution by far. There can be like a religious war between the large antivirus systems, but I do...Continue Reading
Powered by IT Central Station
Valuable Features: Having experienced the frustrations of poorly designed/executed interfaces first-hand, one of the most valuable features...Continue Reading
The way that it automates the provisioning of accounts is valuable but there were some deployment issues.Powered by IT Central Station
Valuable Features: The way that it automated the provisioning of accounts for employees and students and the quick response time. •...Continue Reading
Manage Windows Security: Alerts, Updates and Best Practices
Learn to apply best practices and optimize your operations.
Recent malware issues with Lenovo's automatic update system have some worried about the risks associated with automatic updates. Experts say secure update processes are better than ever and result in less risk than waiting to patch vulnerabilities. Continue Reading
Outdated ActiveX controls can pose serious security risks. Enterprise threats expert Nick Lewis discusses how to block them in the enterprise. Continue Reading
In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8. Continue Reading
Problem Solve Windows Security: Alerts, Updates and Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security. Continue Reading
It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised. Continue Reading
Ensuring BYOD access in an enterprise environment can be quite challenging, especially when it comes to balancing security with employee satisfaction. Learn about different Windows 8.1 features that can help ease the process. Continue Reading