February 01, 2016
What methods are attackers using to find vulnerabilities in corporate networks? Are these security attacks really advancing? We look at the latest hacking techniques and find out from top security researchers how malware and advanced cyberthreats are evolving. What steps can enterprises take in the coming year to bolster their threat defenses against multilayered security attacks? Our analysis lays the groundwork for 2016.
Even with the right tools in place, sometimes a security attack triggers an emergency response. Providers of professional incident response services can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding cyberthreat. But there's a lot you need to do to get the best out of these services. We deconstruct the emergency incident response process, from scoping the problem to contact and remediation to reporting post-incident.
We continue our Readers' Top Picks series with a look at two categories likely to be top of mind this year -- cloud security and data loss prevention. We crunch the numbers on survey respondents who indicated plans to invest in these tools in the next 12 months. We report on respondents' shortlists of potential providers, feature wish lists and key reasons for rolling out these projects. Not surprisingly, technology integration scored high among the readers polled; 70% said they are more likely to deploy DLP products if they are offered as a suite of interconnected tools.
January 28, 2016
Ingram Micro has introduced FirePower Network Threat Assessment services, the latest in a series of assessment services the distributor offers its channel partners.
January 14, 2016
This week, bloggers explore enterprise network architecture challenges, the increasing danger of exploit kits and how best to oversee private cloud management.
December 18, 2015
News roundup: As EU's Global Data Protection Regulation advances, businesses anticipate higher penalties and compliance costs. Also, malware roundup.
Malware Get Started
Bring yourself up to speed with our introductory content
In this excerpt of Building an Information Security Awareness Program, authors Bill Gardner and Valerie Thomas discuss why lecturing is an ineffective method of security awareness programs and offer alternative measures enterprises should consider. Continue Reading
Expert Earl Follis explains how patch management software keeps enterprises better protected by automating the delivery of operating systems and application updates. Continue Reading
Just Enough Administration restricts administrative access to the bare necessities for user tasks, giving organizations more control over security. Continue Reading
Evaluate Malware Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A new phishing scam uses voicemail notification emails to spread malware. Expert Nick Lewis explains how this attack works and how enterprises can prevent it. Continue Reading
A flaw in Microsoft allows attackers in through executable embedded documents. Expert Nick Lewis explains the vulnerability and how enterprises can stop it. Continue Reading
A new malware obfuscation technique uses HTML5 to prevent detection of drive-by downloads. Expert Nick Lewis explains the technique and what enterprises can do about it. Continue Reading
Learn to apply best practices and optimize your operations.
Professional incident response providers can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat. Continue Reading
The Trust Center in Microsoft's Office suite has some important and useful settings to prevent users from opening files infected with malware and viruses, but admins need to know about and enable them. Continue Reading
When planning a Windows 10 migration, it can be easy to get lost in all the planning and newness that come with a fresh OS. But while you're planning that upgrade, Windows 7 security should still be a concern. Continue Reading
Problem Solve Malware Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A drive-by download attack targets everyone while a drive-by login attack gets personal. Expert Nick Lewis explains the two attacks and what can be done to stop them. Continue Reading
Attackers may be looking to use steganography techniques to hide their malware. Expert Nick Lewis explains how they work and how to spot them. Continue Reading
Attackers can use accelerometer tracking on mobile devices as an eavesdropping tool. Here are some ways to reduce the threat to your device. Continue Reading