You Are Browsing ‘Security ’ Category

Comments Off on Consolidating Remote Servers and Storage for Security, Efficiency
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures, placing data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance and still ...
Comments Off on Advanced Evasion Techniques for Dummies
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing dee...
Comments Off on Demand More: Get the Most from the Move to a Next-Generation Firewall
As next-generation firewall (NGFW) technology becomes more mainstream, it is time to review the advanced capabilities and features that separate the leaders from the laggards. At its most basic, the consensus of a NGFW definition would include these capabilities – standard firewall features like stateful inspection and network address translation, integrated intrusion prevention, application awareness and some level of intelligence and integrat...
Comments Off on History of Cryptograpy – An Easy to Understand History of Cryptography
The go-to method of securing sensitive information and ensuring privacy has always been encryption, and to best utilize it, you need to understand it backwards and forwards, because hackers sure do. This informative paper takes a detailed look at the history of cryptography, going as far back as Ancient Babylon, to give you a thorough understanding of the evolution and application of encrypting important information. Read on to learn about the past...
Comments Off on Fraud Alert: New Phishing Tactics — and How They Impact Your Business
Phishing attacks are still around a) because they’re easy to execute, and b) because they generally work. Did you know 800,000 users click on malicious links every single day? This white paper outlines a number of best practices that will help protect your organization and your users from phishing attacks and details the latest phishing trends that you need to know about. View now to learn more! ...
Comments Off on How to Choose a Certificate Authority for Safer Web Security
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the...
Comments Off on Choose the Right Security Solution: Moving Beyond SSL to Establish Trust
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions. ...
Comments Off on Endpoint Security: It’s Not Just Black or White
Learn how the meshed defense of blacklisting and whitelisting can detect and block both malicious payloads and malicious actions that compromise a system and its network infrastructure. ...
Comments Off on AV TEST Report: Proactive Rootkit Protection Comparison Test
Growth rates in malware show the need for pro-active protection measures against zero-day attacks. Learn from AV TEST how the pro-active approach of McAfee's Deep Defender is capable of providing a very good level of protection against kernel-mode and MBR rootkits. ...
Comments Off on NSS Labs Report: Corporate AV/EPP Comparative Analysis
The results of NSS Labs in-depth testing of 41 individual exploits and over 200 attack scenarios reveals significant differences in the defensive capabilities of 11 leading endpoint protection solutions. ...