Paul Rubens - Article Archives - Page 2

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017
Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.
READ MORE

Common Types of Ransomware

March 2, 2017
Ransomware is getting more sophisticated all the time, so prevention is key to avoid paying the ransom or losing data.
READ MORE

How to Stop Ransomware

January 31, 2017
Ransomware is a fast-growing security threat. Here's how to prevent it - or get rid of it if you have it.
READ MORE

7 Database Security Best Practices

August 23, 2016
Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.
READ MORE

5 Freaky but Real Application Security Threats

July 28, 2016
There are some new application security threats in town, and they are pretty scary.
READ MORE

How to Encrypt a Flash Drive Using VeraCrypt

July 5, 2016
Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.
READ MORE

What Is SQL Injection and How Can It Hurt You?

June 23, 2016
Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.
READ MORE

7 Full Disk Encryption Solutions to Check out

May 17, 2016
Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.
READ MORE

How to Get Identity Authentication Right

April 13, 2016
Identity authentication is especially important for high-value transactions, so it is important to get it right.
READ MORE

6 Ways to Make IAM Work for Third-Party Organizations

March 30, 2016
Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.
READ MORE

Everything You Need to Know about NGFW

March 23, 2016
Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.
READ MORE

Top 10 Ways to Secure a Windows File Server

February 17, 2016
Have you hardened your Windows file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.
READ MORE

What Are Your Container Security Options?

February 3, 2016
As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.
READ MORE

Are There Open Source Vulnerability Assessment Options?

January 26, 2016
Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.
READ MORE

6 Tips for Fighting DDoS Attacks

January 25, 2016
Distributed denial of service (DDoS) attacks can wreak havoc on your business. What can you do to stop a DDoS attack?
READ MORE

10 Open Source Vulnerability Assessment Tools

January 20, 2016
Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.
READ MORE

Open Source Software's Role in Breach Prevention and Detection

December 29, 2015
While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.
READ MORE

5 Big Improvements in Wireshark

December 23, 2015
It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.
READ MORE

10 Open Source Security Breach Prevention and Detection Tools

December 18, 2015
The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.
READ MORE