Third-Party Software is a Security Threat (Part 1)
In these two articles we will explore the areas that enterprise need to focus on as a security conscious company to ensure that loose ends are pinned down to improve our overall security posture.
In these two articles we will explore the areas that enterprise need to focus on as a security conscious company to ensure that loose ends are pinned down to improve our overall security posture.
In part one of the series we concentrate on identifying APTs as well as the first steps to safeguarding against APTs attacks with insight into asset clarification and security posture assessment.
This article reflects how the termination of Windows XP support is likely to affect companies or individuals still using the operating system in the interim and any considerations that should be made short term to secure your systems while planning a move to a current and supported version.
In this article we will consider the successful implementation and management of the least-privilege principle and contemplate the challenges and benefits faced by organisations when addressing security through least-privilege.
This article will focus on the security enhancements that Windows 8.x offers, over what is found in the previous versions of Windows. We will also look at enhancements that have been made to the operating system that will help both the individual and the enterprise and effectively will impact data stored in the cloud.
In this article the author looks at ways to achieve an effective Patch Management System.
In this article we will focus on elements that will help develop a comprehensive security strategy for your organisation.
Computing devices have become ubiquitous; people are using multiple devices and connect to networks for access to resources. The most recent strategy is, loosening the perimeter but hardening the core critical services. This article will focus on Network Access Control and the use of this mature technology to enable secure remote working.
In this two part article we will look at planning a security strategy suitable for the long-term, focusing on the future of security and risk management practices.
This article will focus on the importance of SIEM and why it is needed to achieve a higher level of security posture whilst hardening the core.