Misc Network Security

Last Updated on 27 July 2016, Total: 243 Articles and Tutorials

  1. Application security redux: It’s All about the Apps (Part 7)

    In this, Part 7, we will address the last bullet point in our list of topics as we talk about encryption and protection of the data that is created, gathered or stored by applications... Read More

  2. How SIEM Software Can Enforce an Information Security Policy

    Learn how a SIEM solution can enforce your information security policy by ensuring permanent visibility of users’ activities... Read More

  3. Application security redux: It’s All about the Apps (Part 6)

    In this article we’ll wrap up the discussion on restricting what users can do with allowed applications as we touch on a new feature that has been added in Windows 10: the ability to control apps in Windows 10 mobile devices via the CSP... Read More

  4. Application security redux: It’s All about the Apps (Part 5)

    In this article we'll provide a summary of the PowerShell cmdlets that Microsoft has made available for AppLocker... Read More

  5. Application Security Redux: It’s All about the Apps (Part 4)

    In this Part 4, we'll be delving into Microsoft’s AppLocker, which was introduced in Windows 7 and Server 2008 R2 and grew out of the previous Software Restrictions Policies feature... Read More

  6. Top 10 Ways to Reduce the Risk of Data Leakage

    Data is arguably the most important asset in any organization. The implications of corporate data getting into the wrong hands could potentially be catastrophic. This document is going to give you some hopefully useful tips to help you protect yourself against the risks of data leakage... Read More

  7. Application Security Redux: It’s All about the Apps (Part 3)

    In this Part 3 we’ll discuss how you can block undesirable applications and restrict what users are able to do with the apps that you do allow them to use... Read More

  8. Application Security Redux: It’s All about the Apps (Part 2)

    In this Part 2, we’re going to start with a look at how to protect applications from tampering or access and also take a closer look at the special case of mobile applications... Read More

  9. Prioritise your Security Controls - Protect, Detect and Remediate (Part 2)

    This article will focus on the further requirement for detection and remediation once an attack has occurred... Read More

  10. Application Security Redux: It’s All about the Apps (Part 1)

    In this article series, we'll begin with a broad overview of application security, how it's evolved, and why it's so important. Then we'll get more specific and talk about the components of an application security plan and different ways to accomplish the goals that you set... Read More

Featured Links