About 27 results
-
How to respond to a malware incident
When malware is suspected don't jump the gun on diagnosis and countermeasures. Follow these best practice guidelines to ensure an appropriate and measured response.
-
Security lessons from the 2013 Verizon Data Breach Report
Verizon's latest report on data breach statistics offers security pros a guide to the most persistent threats and where attention should be focused to defend against them.
-
In the post-PC era, information security must adapt to new realities
Alfonso Barreiro identifies some fundamental changes that infosec personnel need to make to their approach in order to operate effectively in their organizations.
-
The 12 networking truths applied to information security
Alfonso Barreiro relates the 12 networking truths to the information security field.
-
Making sense of computer forensics
Alfonso Barreiro goes over the basics of computer forensics that all IT pros should know. Preparing your organization for the possibility of a legal investigation should be part of...
-
What you should know about Windows 8 security features
Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous ver...
-
Has the next Cold War already begun in cyberspace?
Alfonso Barreiro likens the current state of cyber warfare measures and counter-measures to a Cold War. Could it escalate? Is it all hype? Take our poll.
-
An overview of Next Generation Firewalls
Alfonso Barreiro explains the security capabilities that Next-Generation Firewalls are supposed to have and offers some tips on what to consider when researching them.
-
Extra protection for Windows PCs with EMET
Alfonso Barreiro offers an overview of EMET -- Microsoft's free Enhanced Mitigation Experience Toolkit -- that applies anti-exploit tech to vulnerable applications and processes.
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.
-
Back to basics: Defending against phishing attacks
Alfonso Barreiro notes that phishing attempts are still duping unwary targets. Here are some tips to share with your users to help protect your organization from compromise.
-
Preparing for the DNSChanger Internet outage
Alfonso Barreiro tells all you need to know to clean up the DNSChanger malware that has affected millions of users. Make sure your organization is prepared for the July 9, 2012 dea...
-
Defending against Advanced Persistent Threats
Alfonso Barreiro defines the security class known as Advanced Persistent Threats (APTs) and describes the security view you should take of your organization to combat them.
-
Attacked by Anonymous: How to defend against a denial-of-service
Alfonso Barreiro witnessed an Anonymous-led attack firsthand. Here is a description of their primary weapons and the countermeasures that can be taken against them.
-
Be careful not to incur security debt
Alfonso Barreiro explains the concept of security debt and how you can use this metaphor to raise awareness about security problems that might exist in your own organization.
-
How to sell information security to management
Alfonso Barreiro shares his tips for selling security initiatives to management -- as well as a few methods you should avoid.
-
Six information security lessons from 2011
Alfonso Barreiro lists the most important security lessons from 2011 that the security-conscious should heed in order to plan accordingly for 2012.
-
Controlling your network using Network Access Control
Alfonso Barreiro looks at the various methods of implementing network access control (NAC) in order to keep unauthorized and non-compliant devices off your network.
-
Implementing multi-factor authentication: What to consider
Alfonso Barreiro points out the main issues you'll have to consider when implementing multi-factor authentication. These solutions can strengthen security, but only if you design t...
-
Authenticating users: Going beyond the password
Alfonso Barreiro describes the most common authentication factors in use today and lists their strengths and weaknesses. What is the next step in authentication strategies?