June 02, 2015
Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.
Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.
A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios.
May 26, 2015
A newly discovered router vulnerability could leave millions of connected devices open to denial-of-service attacks and remote code execution.
January 16, 2015
News roundup: Recently discovered firmware flaws highlight the challenges posed by hardware security. Plus: Heartland's breach warranty; RSA's overhaul; and Download.com's app (in)security.
November 07, 2014
News roundup: Open Wi-Fi allegedly aided a fugitive in evading authorities, highlighting Wi-Fi hotspot risks as ISPs including Comcast turn residential gateways into hotspots. Plus: Google's nogotofail tool; messaging apps fail EFF security review; new malware targets iOS.
USB Get Started
Bring yourself up to speed with our introductory content
There are many risks associated with data sharing across devices and services, which is why using data encryption in the cloud is so important. Continue Reading
It's OK to install desktops applications on a Windows To Go image, as long as they're small enough to fit on the USB drive and can run locally. Continue Reading
Having a DR plan in place is important, especially if you host virtual desktops. But how should you plan for VDI disaster recovery? Consider Hyper-V, Windows To Go, storage replication and offline virtual desktops. Continue Reading
Evaluate USB Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading
Ubiquitous RJ-45 connectors reign supreme even in the wake of newer data center technologies. USB 3.1 cables are out there; can they be the next big thing? Continue Reading
One of the perks of virtual desktop infrastructure is that you can use it as a disaster recovery tool. Not only must businesses relying on virtual desktops make sure that they have backups, but they must also be aware of storage requirements and desktop as a service expectations. When considered as part of a DR plan, VDI can improve centralized management and control in case of a disaster. Continue Reading
Learn to apply best practices and optimize your operations.
A rootkit was found and you think you've removed it, but how do you confirm it? Enterprise threats expert Nick Lewis explains the next steps to ensure rootkit removal. Continue Reading
Hybrid threats are becoming an increasing issue for mobile devices. Enterprise threats expert Nick Lewis explains how to mitigate the risk. Continue Reading
Do you have more install or diagnostic environment images to manage than physical UFDs? Learn how to back up and restore bootable USB device images. Continue Reading
Problem Solve USB Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows To Go only works for Windows 8 bootable USB flash drives; to create a virtual hard drive for Windows 7 installation, try Boot to VHD. Continue Reading
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat. Continue Reading
Experts explain why embedded software testing projects call for heightened security and better code coverage than mobile or desktop test efforts do. Continue Reading