About 27 results
-
How to respond to a malware incident
When malware is suspected don't jump the gun on diagnosis and countermeasures. Follow these best practice guidelines to ensure an appropriate and measured response.
-
Security lessons from the 2013 Verizon Data Breach Report
Verizon's latest report on data breach statistics offers security pros a guide to the most persistent threats and where attention should be focused to defend against them.
-
In the post-PC era, information security must adapt to new realities
Alfonso Barreiro identifies some fundamental changes that infosec personnel need to make to their approach in order to operate effectively in their organizations.
-
The 12 networking truths applied to information security
Alfonso Barreiro relates the 12 networking truths to the information security field.
-
Making sense of computer forensics
Alfonso Barreiro goes over the basics of computer forensics that all IT pros should know. Preparing your organization for the possibility of a legal investigation should be part of...
-
What you should know about Windows 8 security features
Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous ver...
-
Has the next Cold War already begun in cyberspace?
Alfonso Barreiro likens the current state of cyber warfare measures and counter-measures to a Cold War. Could it escalate? Is it all hype? Take our poll.
-
An overview of Next Generation Firewalls
Alfonso Barreiro explains the security capabilities that Next-Generation Firewalls are supposed to have and offers some tips on what to consider when researching them.
-
Extra protection for Windows PCs with EMET
Alfonso Barreiro offers an overview of EMET -- Microsoft's free Enhanced Mitigation Experience Toolkit -- that applies anti-exploit tech to vulnerable applications and processes.
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.
-
Back to basics: Defending against phishing attacks
Alfonso Barreiro notes that phishing attempts are still duping unwary targets. Here are some tips to share with your users to help protect your organization from compromise.
-
Preparing for the DNSChanger Internet outage
Alfonso Barreiro tells all you need to know to clean up the DNSChanger malware that has affected millions of users. Make sure your organization is prepared for the July 9, 2012 dea...
-
Defending against Advanced Persistent Threats
Alfonso Barreiro defines the security class known as Advanced Persistent Threats (APTs) and describes the security view you should take of your organization to combat them.
-
Attacked by Anonymous: How to defend against a denial-of-service
Alfonso Barreiro witnessed an Anonymous-led attack firsthand. Here is a description of their primary weapons and the countermeasures that can be taken against them.
-
Be careful not to incur security debt
Alfonso Barreiro explains the concept of security debt and how you can use this metaphor to raise awareness about security problems that might exist in your own organization.
-
How to sell information security to management
Alfonso Barreiro shares his tips for selling security initiatives to management -- as well as a few methods you should avoid.
-
Six information security lessons from 2011
Alfonso Barreiro lists the most important security lessons from 2011 that the security-conscious should heed in order to plan accordingly for 2012.
-
Controlling your network using Network Access Control
Alfonso Barreiro looks at the various methods of implementing network access control (NAC) in order to keep unauthorized and non-compliant devices off your network.
-
Implementing multi-factor authentication: What to consider
Alfonso Barreiro points out the main issues you'll have to consider when implementing multi-factor authentication. These solutions can strengthen security, but only if you design t...
-
Authenticating users: Going beyond the password
Alfonso Barreiro describes the most common authentication factors in use today and lists their strengths and weaknesses. What is the next step in authentication strategies?
-
The perils of security silver bullets
Alfonso Barreiro warns that there are no silver bullets in security. Here are the risks of becoming too complacent in your security posture or relying too heavily on technological ...
-
Training employees on security measures doesn't have to be boring
Alfonso Barreiro offers some practical tips on how to cover security awareness with employees without boring them to tears or ignoring opportunities for meaningful engagement.
-
How to choose a SIEM solution: An overview
Alfonso Barreiro offers some tips on choosing a Security Information and Event Management (SIEM) solution and addresses the question of whether you need one.
-
A log review process for detecting security incidents
Alfonso Barreiro details the requirements for implementing a log review process that will help your organization detect and respond to security incidents more promptly.
-
How to track down malware from your firewall with basic tools
Alfonso Barreiro covers the basics of detecting a malware threat and investigating it with freely available tools like netstat and procmon. Here is an example of the process.
-
Don't get stung by SQL Injection attacks
SQL Injection is no new arrival on the scene, yet high-profile attacks still occur. Alfonso Barreiro lists the basic measures to take to help mitigate the threat.
-
Back to basics: A four phase approach to patch management
Alfonso Barreiro addresses one of the most common risk mitigation tools in every organization -- patch management. He presents a four-phase approach that will help you create your ...