Topics
Content Types
About 17 results
-
How to respond to a malware incident
When malware is suspected don't jump the gun on diagnosis and countermeasures. Follow these best practice guidelines to ensure an appropriate and measured response.
-
Security lessons from the 2013 Verizon Data Breach Report
Verizon's latest report on data breach statistics offers security pros a guide to the most persistent threats and where attention should be focused to defend against them.
-
In the post-PC era, information security must adapt to new realities
Alfonso Barreiro identifies some fundamental changes that infosec personnel need to make to their approach in order to operate effectively in their organizations.
-
The 12 networking truths applied to information security
Alfonso Barreiro relates the 12 networking truths to the information security field.
-
Making sense of computer forensics
Alfonso Barreiro goes over the basics of computer forensics that all IT pros should know. Preparing your organization for the possibility of a legal investigation should be part of...
-
Has the next Cold War already begun in cyberspace?
Alfonso Barreiro likens the current state of cyber warfare measures and counter-measures to a Cold War. Could it escalate? Is it all hype? Take our poll.
-
An overview of Next Generation Firewalls
Alfonso Barreiro explains the security capabilities that Next-Generation Firewalls are supposed to have and offers some tips on what to consider when researching them.
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.
-
Defending against Advanced Persistent Threats
Alfonso Barreiro defines the security class known as Advanced Persistent Threats (APTs) and describes the security view you should take of your organization to combat them.
-
Be careful not to incur security debt
Alfonso Barreiro explains the concept of security debt and how you can use this metaphor to raise awareness about security problems that might exist in your own organization.