Microsegmentation promises substantial improvements over classic architectures for the protection of applications and increased security when building out the efficiency of a data center.
Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.
Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
The Bro security framework takes a new approach to security monitoring, with the emphasis on trends and long-term analysis.
With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
The focus in SQL Server 2016 is on mobility, cloud usage, and speed, with improvements to in-memory processing and security.
Attacks on Microsoft Office files are increasing. A multilayered approach is your best protection against this malware.