About 27 results
-
How to respond to a malware incident
When malware is suspected don't jump the gun on diagnosis and countermeasures. Follow these best practice guidelines to ensure an appropriate and measured response.
-
Security lessons from the 2013 Verizon Data Breach Report
Verizon's latest report on data breach statistics offers security pros a guide to the most persistent threats and where attention should be focused to defend against them.
-
In the post-PC era, information security must adapt to new realities
Alfonso Barreiro identifies some fundamental changes that infosec personnel need to make to their approach in order to operate effectively in their organizations.
-
The 12 networking truths applied to information security
Alfonso Barreiro relates the 12 networking truths to the information security field.
-
Making sense of computer forensics
Alfonso Barreiro goes over the basics of computer forensics that all IT pros should know. Preparing your organization for the possibility of a legal investigation should be part of...
-
What you should know about Windows 8 security features
Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous ver...
-
Has the next Cold War already begun in cyberspace?
Alfonso Barreiro likens the current state of cyber warfare measures and counter-measures to a Cold War. Could it escalate? Is it all hype? Take our poll.
-
An overview of Next Generation Firewalls
Alfonso Barreiro explains the security capabilities that Next-Generation Firewalls are supposed to have and offers some tips on what to consider when researching them.
-
Extra protection for Windows PCs with EMET
Alfonso Barreiro offers an overview of EMET -- Microsoft's free Enhanced Mitigation Experience Toolkit -- that applies anti-exploit tech to vulnerable applications and processes.
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.