dcsimg

Paul Rubens - Article Archives - Page 5

How Big Data Analytics Can Boost Network Security

August 26, 2013
While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.
READ MORE

Digital Certificate Dangers, and How to Fight Them

August 8, 2013
While digital certificates play a vital security role, they also present security risks. A certificate management system is a good way to mitigate many of those risks.
READ MORE

Will PRISM Impact Data Protection Strategies?

June 25, 2013
As details of the National Security Agency's PRISM program continue to emerge, how concerned should enterprises be about government requests for data?
READ MORE

4 Tips for Cloud Compliance

June 12, 2013
Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
READ MORE

BYOD Fuels NAC Comeback

April 11, 2013
The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.
READ MORE

6 Emerging Security Threats, and How to Fight Them

March 25, 2013
Hackers are nothing if not creative, so it's important for enterprise security pros to educate themselves about emerging security threats like these six.
READ MORE

Anti-Virus Isn't Enough: 7 Steps to Discourage Hackers

March 6, 2013
Anti-virus software is no longer a match for today's threats. Here's what your business needs to stay protected.
READ MORE

Cloud Becoming Key Element of Enterprise Security Strategies

February 25, 2013
While cloud security technology hasn't eliminated cybercrime, it has given organizations some new and effective ways of fighting it.
READ MORE

Virtualization Poses Security Risks in Public Cloud

February 19, 2013
Companies moving applications to a public cloud need to be aware of the risks created by using virtual machines in a shared cloud infrastructure.
READ MORE

How to Prevent Spear Phishing Attacks

November 26, 2012
While security software can help prevent spear phishing attacks, staff training is the best way to avoid phishing losses.
READ MORE

How to Prevent Security Breaches from Known Vulnerabilities

November 2, 2012
While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks.
READ MORE

Review: Malwarebytes Enterprise Edition

October 24, 2012
Malwarebytes Enterprise Edition detects and removes malware, removing all traces after a system has been infected, a capability that is likely to be especially important to small businesses.
READ MORE

7 IPv6 Security Risks

October 18, 2012
Not many people consider security risks associated with IPv6, the newest version of the Internet Protocol. But maybe they should.
READ MORE

Review: Microsoft System Center 2012 Endpoint Protection

September 25, 2012
While Microsoft System Center 2012 Endpoint Protection offers deployment and management convenience, its anti-malware engine is weak in comparison to competitors.
READ MORE

Review: McAfee Deep Defender

August 23, 2012
Rootkits are in the crosshairs of this innovative anti-malware technology that runs directly on the processor, underneath the operating system.
READ MORE

Biometric Authentication: How It Works

August 18, 2012
Passwords are potentially the weakest link in your organization's information security systems. Biometric authentication technologies promise a more secure alternative.
READ MORE

Review: Total Defense Anti-Virus r12

August 13, 2012
CA Technologies spinoff Total Defense offers robust management capabilities in its AV-only product. But the software lags a bit behind the competition in anti-malware sophistication.
READ MORE

Five Signs Your Website is the Target of an Automated Attack

August 10, 2012
Here's how to detect and fight back against hackers who are using automated tools to attack your website.
READ MORE

Review: Avast Endpoint Protection Suite

August 9, 2012
Multiple levels of anti-malware protection combined with a community-based threat detection network and a centralized management server make Avast a compelling alternative for business-level virus protection.
READ MORE