Products

Evaluating the Security of Sliced Data Storage in the Cloud

Storage slicing is an innovative storage technology offered by companies including Symform and...

Is Your Free AV a System Hog?

The effectiveness of malware detection, how well it catches infections, is the chief...

Review: SUPERAntiSpyware 5

SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which...

Intro to Next Generation Firewalls

The traditional stateful firewall filters traffic based upon ports and protocols. For example,...

Linux Hardening – Quick Wins

The best way to ensure that your Linux server is secure is to...

More Tips on Removing Viruses and Malware

The first thing to do is determine the validity of any antivirus alerts....

Ten Tips to Make Your SSL Secure

If your SSL server have misconfigurations and known vulnerabilities that make it insecure,...

5 Best Practices for Securing Remote Access

A decade ago, secure remote access was a right enjoyed by a privileged few: road warriors, executives,...

Top 5 PDF Risks and How to Avoid Them

In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47...

How to: Set Up TrueCrypt Disk Encryption, Part 1

Even if your Windows (or other OS) account is password-protected, thieves can still...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...