Zero-day exploits: Separating fact from fiction

December 10, 2013
You may be surprised by the number and availability of zero-days, but that's no reason to let an attack catch you unprepared
Read more »

7 essentials for creating a greenfield environment

December 03, 2013
Perhaps your network is so badly compromised or bedraggled that you need to start from scratch. Here's how to go about it
Read more »

The 10 Windows group policy settings you need to get right

November 26, 2013
Configure these 10 group policy settings carefully, and you can expect better Windows security across the office
Read more »

NSA spying will ultimately benefit us all

November 19, 2013
The relentless migration to the cloud requires strong encryption. Customers will demand it -- and snooping will be deterred
Read more »

4 reasons BadBIOS isn't real

November 12, 2013
Did a noted security researcher find a superbug -- or go crazy? In light of the facts, supposed existence of BadBIOS doesn't add up
Security, Malware
Read more »

Patch first, ask questions later

November 05, 2013
You'll never have a perfectly patched environment, so play the odds -- patch software hit most by successful exploits first
Read more »

With security, prayer is not the answer

October 29, 2013
To apply the right countermeasures, you need hard data about the attacks you face and the weaknesses in your defenses, not just blind faith
Security
Read more »

Don't put all your faith in smart cards

October 22, 2013
Smart cards bolster authentication, but they're hardly a panacea for your company's security questions
Read more »

'Jump boxes' improve security, if you set them up right

October 15, 2013
It's a good idea to set up an ultrasecure computer as a bridge to log on to other PCs, but serious protections must be in place
Read more »

Is your security vendor colluding with the NSA?

October 08, 2013
Encryption software using EC_DRBG random number generator could provide backdoor for NSA to snoop on protected data
Read more »
©1994-2014 Infoworld, Inc.