When it comes to IT security, the typical defensive toolsets garner all the attention: firewalls, antivirus and antispyware apps, as well as intrusion-detection and prevention systems. While they all ...
The National Institute of Standards and Technology on Thursday issued two draft publications aimed at securing digital assets: Guide for Security Configuration Management of Information Systems and ...
Microsoft Defender introduces Effective Settings to show enforced device security configurations. Feature reveals final policy values and configuration sources across management layers. Enhanced ...
IT organizations need to become more effective at running cooperative processes across IT security and operations. IT security groups should influence operational security configuration management ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
Portland, OR September 13, 2011 Tripwire, Inc., a leading global provider of IT security and compliance solutions, today announced the next generation of its flagship Tripwire' Enterprise suite, the ...
New Boundary Technologies today announced availability of its Government Lockdown Solution. Powered by the company's Policy Commander security policy management product, the Government Lockdown ...
Malware analysis has two basic approaches that fall into either the static or dynamic analysis category. The static approach analyzes the malicious executable itself by disassembling it to determine ...
Commentary - As computer software has become the backbone of modern civilization, organized cyber criminals, state sponsored cyber attackers and terrorist organizations try to exploit design flaws and ...
Configuration management is a discipline for the ages. It is not new, but it certainly has been in the news lately. Configuresoft recently announced an impressive 47% revenue growth, expanding its ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...