Network traffic mgmt

USB News

  • December 22, 2015 22 Dec'15

    Hack in Juniper firewalls spurs investigation

    ICYMI: A serious breach in Juniper firewalls spurs industry and government reaction; Gartner names three APM leaders; and Savvius targets twin-stream packet capture for WLAN device.

  • December 17, 2015 17 Dec'15

    Apple's magic won't be enough for the enterprise market

    As 2015 draws to a close, the staff of TechTarget's end-user computing sites took to Slack and held an hour-long chat about the year's biggest trends. Over the next few days, we'll bring you ...

  • August 11, 2015 11 Aug'15

    Windows 10 gets its first Patch Tuesday updates

    Microsoft wastes no time delivering its first critical Windows 10 Patch Tuesday fixes, along with critical updates for its Edge and IE browsers.

  • June 02, 2015 02 Jun'15

    Malware analysis beyond the sandbox

    Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.

    Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.

    A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios.

View All News

USB Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate USB Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage USB

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve USB Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close