New & Notable
Platform security News
August 08, 2019
Check Point revealed research at Black Hat that showed a previously disclosed vulnerability in Microsoft's remote desktop protocol affects the company's virtualization platform.
July 31, 2019
Google Project Zero researchers disclosed six iOS vulnerabilities, including proof-of-concept code that could allow for attacks requiring no user interaction.
June 20, 2019
Threat Stack Application Security Monitoring will bring security, visibility and protection to cloud-based architecture and applications, according to the vendor.
May 09, 2019
Google's security and privacy upgrades to Android are mostly forward-thinking changes, readying for a future that is inevitable but unclear, rather than ways to improve security today.
Platform security Get Started
Bring yourself up to speed with our introductory content
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Continue Reading
IT professionals must carefully consider which security tools they use to protect their Windows 10 desktops. They may want to stray from the Microsoft path in some instances. Continue Reading
IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT). Continue Reading
Evaluate Platform security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Windows Defender includes several features IT pros can use to tighten security. Application Guard, for example, isolates browser sessions to defend against internet-based attacks. Continue Reading
Unpatched software and OSes can create a huge security hole in any organization. IT should know what tools can fill in the gaps. Continue Reading
Some pioneers of AI in cybersecurity find progress thus far limited, but machine learning still offers an advancement in protecting enterprise networks and data. Continue Reading
Manage Platform security
Learn to apply best practices and optimize your operations.
Enterprises are now operating in a cloud-virtual world. Understanding four steps to ensure virtual machine security in cloud computing environments is crucial. Continue Reading
Security researchers demonstrated how a new fileless attack technique can bypass a Windows kernel protection feature at Black Hat 2018. Find out how the technique works. Continue Reading
A new version of GandCrab was discovered by researchers in July 2018 and involves the use of legacy systems. Learn how this version differs and who is at risk with Nick Lewis. Continue Reading
Problem Solve Platform security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend against such attacks. Continue Reading
As container security vulnerabilities continue to emerge, companies should plan ahead and have strategies ready to defend against looming segmentation failures. Continue Reading
Mozilla's Firefox 63 automatically blocks tracking cookies and other site data from cross-site tracking. Learn what this is and what the benefits of blocking it are with Nick Lewis. Continue Reading