December 22, 2015
ICYMI: A serious breach in Juniper firewalls spurs industry and government reaction; Gartner names three APM leaders; and Savvius targets twin-stream packet capture for WLAN device.
December 17, 2015
As 2015 draws to a close, the staff of TechTarget's end-user computing sites took to Slack and held an hour-long chat about the year's biggest trends. Over the next few days, we'll bring you ...
August 11, 2015
Microsoft wastes no time delivering its first critical Windows 10 Patch Tuesday fixes, along with critical updates for its Edge and IE browsers.
June 02, 2015
Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.
Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.
A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios.
USB Get Started
Bring yourself up to speed with our introductory content
In this first part of a three-part series, expert developer Barry Burd takes you through his experience ordering, receiving, unwrapping and setting up the OnePlus 2 mobile phone. Continue Reading
There are many risks associated with data sharing across devices and services, which is why using data encryption in the cloud is so important. Continue Reading
It's OK to install desktops applications on a Windows To Go image, as long as they're small enough to fit on the USB drive and can run locally. Continue Reading
Evaluate USB Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading
Ubiquitous RJ-45 connectors reign supreme even in the wake of newer data center technologies. USB 3.1 cables are out there; can they be the next big thing? Continue Reading
One of the perks of virtual desktop infrastructure is that you can use it as a disaster recovery tool. Not only must businesses relying on virtual desktops make sure that they have backups, but they must also be aware of storage requirements and desktop as a service expectations. When considered as part of a DR plan, VDI can improve centralized management and control in case of a disaster. Continue Reading
Learn to apply best practices and optimize your operations.
A rootkit was found and you think you've removed it, but how do you confirm it? Enterprise threats expert Nick Lewis explains the next steps to ensure rootkit removal. Continue Reading
Hybrid threats are becoming an increasing issue for mobile devices. Enterprise threats expert Nick Lewis explains how to mitigate the risk. Continue Reading
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
Problem Solve USB Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows To Go only works for Windows 8 bootable USB flash drives; to create a virtual hard drive for Windows 7 installation, try Boot to VHD. Continue Reading
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat. Continue Reading
Experts explain why embedded software testing projects call for heightened security and better code coverage than mobile or desktop test efforts do. Continue Reading