Misc Network Security

Last Updated on 19 April 2017, Total: 247 Articles and Tutorials

  1. Where to (and not to) focus your security efforts

    20 years ago we approached IT and security quite differently compared to how it is done (or should be done) today. Most organisations had their data centres onsite, housing servers where they kept everything locked away behind a firewall... Read More

  2. Mirai may be coming to a Windows machine near you

    The Mirai botnet has been the cause of many notorious DDoS attacks of late, denying access to popular services including Facebook, Amazon, Twitter and Netflix to name a few. The IoT based botnet is now going a step further and is utilising Windows hosts to facilitate attacks... Read More

  3. Application security redux: It’s All about the Apps (Part 8)

    In this, Part 8 and the last installment of our series, we will continue the application data protection story as we delve a little deeper into the challenges inherent in developing an effective data security strategy and particularly the problems of securing mobile device data and securing data that’s stored in the cloud... Read More

  4. Changing face of Compliance and data protection

    The revised data protection laws for Europe have been agreed. By late May 2018 the regulation will be enforced - although at a glance this seems quite some time away, the amount of work and changes that most organisations must undertake to reach compliance with the new General Data Protection Regulation (GDPR) is extensive. We should not delay but rather... Read More

  5. Application security redux: It’s All about the Apps (Part 7)

    In this, Part 7, we will address the last bullet point in our list of topics as we talk about encryption and protection of the data that is created, gathered or stored by applications... Read More

  6. How SIEM Software Can Enforce an Information Security Policy

    Learn how a SIEM solution can enforce your information security policy by ensuring permanent visibility of users’ activities... Read More

  7. Application security redux: It’s All about the Apps (Part 6)

    In this article we’ll wrap up the discussion on restricting what users can do with allowed applications as we touch on a new feature that has been added in Windows 10: the ability to control apps in Windows 10 mobile devices via the CSP... Read More

  8. Application security redux: It’s All about the Apps (Part 5)

    In this article we'll provide a summary of the PowerShell cmdlets that Microsoft has made available for AppLocker... Read More

  9. Application Security Redux: It’s All about the Apps (Part 4)

    In this Part 4, we'll be delving into Microsoft’s AppLocker, which was introduced in Windows 7 and Server 2008 R2 and grew out of the previous Software Restrictions Policies feature... Read More

  10. Top 10 Ways to Reduce the Risk of Data Leakage

    Data is arguably the most important asset in any organization. The implications of corporate data getting into the wrong hands could potentially be catastrophic. This document is going to give you some hopefully useful tips to help you protect yourself against the risks of data leakage... Read More