Articles

Microsoft to cover Windows 7 with advanced threat service

Windows Defender Advanced Threat Protection can detect ongoing attacks on corporate networks, investigate the attack or breach, and provide response recommendations. It will be added to Windows 7 and 8.1 by this summer.

Partner Content
Knocking-off NAC, just not yet!

This article talks about the renewed need for Network Admission Control (NAC) solutions in organizations dealing with employees, guests and contractors connecting through various devices to the corporate network

Governments eye their own blockchain cryptocurrencies

This year will see the maturation of blockchain, as 2017's pilot projects turn into 2018's real-world implementations in a variety of industries. That includes governments, some of whom are now testing cryptocurrencies as fiat money.

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

The Qubes high-security operating system gains traction in the enterprise

Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit.

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.

Partner Content
Make way for SDP

Drawing the analogy to the modern-day network managers, you can’t manage the network you can’t see.

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

This hacker is rating software security Consumer Reports-style

The Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.

Partner Content
Vulnerability Management: A guide for buyer

Finding and fixing these vulnerabilities before the attackers can take advantage of them is a proactive defensive measure that is an essential part of any security program.

6 reasons you’re failing to focus on your biggest IT security threats

Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype.

China’s moves against cryptocurrencies could affect blockchain growth

As China clamps down on the use of bitcoin, other nations and businesses are also seeking to more heavily regulate cryptocurencies and, more generally, blockchain-based networks.