About 27 results
-
How to respond to a malware incident
When malware is suspected don't jump the gun on diagnosis and countermeasures. Follow these best practice guidelines to ensure an appropriate and measured response.
-
Extra protection for Windows PCs with EMET
Alfonso Barreiro offers an overview of EMET -- Microsoft's free Enhanced Mitigation Experience Toolkit -- that applies anti-exploit tech to vulnerable applications and processes.
-
How to choose a SIEM solution: An overview
Alfonso Barreiro offers some tips on choosing a Security Information and Event Management (SIEM) solution and addresses the question of whether you need one.
-
Use MS Security Compliance Manager to secure your Windows environment
Alfonso Barreiro recommends Microsoft's Security Compliance Manager tool to help you create and maintain security baselines using Group Policy Objects.
-
What you should know about Windows 8 security features
Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous ver...
-
Security lessons from the 2013 Verizon Data Breach Report
Verizon's latest report on data breach statistics offers security pros a guide to the most persistent threats and where attention should be focused to defend against them.
-
An overview of Next Generation Firewalls
Alfonso Barreiro explains the security capabilities that Next-Generation Firewalls are supposed to have and offers some tips on what to consider when researching them.
-
Controlling your network using Network Access Control
Alfonso Barreiro looks at the various methods of implementing network access control (NAC) in order to keep unauthorized and non-compliant devices off your network.
-
Authenticating users: Going beyond the password
Alfonso Barreiro describes the most common authentication factors in use today and lists their strengths and weaknesses. What is the next step in authentication strategies?
-
A log review process for detecting security incidents
Alfonso Barreiro details the requirements for implementing a log review process that will help your organization detect and respond to security incidents more promptly.