AETs are designed to evade next generation firewalls. A free tool can help security admins identify potential weaknesses in firewalls.
Because advanced evasion techniques can evade the detection capabilities of many firewalls, they are an especially dangerous weapon in the attackers' arsenal.
The nefarious types looking to compromise … more »
Microsoft Windows PowerShell and JEA simplify the process of moving from global administrator accounts to limited local accounts, a best practice in securing Windows Server-based systems.
Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.
Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?
Experts say increased automation and better analytics will help security teams overwhelmed by Big Data.
As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.
Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.