Jul 11, 2018 11:04:51 AM

Defending against Malware

Defending against Malware has focused on reactive technologies: intrusion detection, content filtering, detecting and blocking malware, etc. Time to get proactive. Reactive Malware Defense Technologies There is an ongoing argument as to how effective those reactive technologies are. There's no argument about the fact that most of these solutions require very competent operators: without a good adm...
Jul 10, 2018 1:21:21 PM

Web Security Basics

Web security, your site and your network Web sites are unfortunately prone to security risks. And so are any networks to which web servers are connected. Setting aside risks created by employee use or misuse of network resources, your web server and the site it hosts present your most serious sources of security risk. Web servers by design open a window between your network and the world. The care...
Jul 10, 2018 1:10:12 PM

Penetration Testing Tools You Can Use

Pen testing always includes a vulnerability assessment Penetration testing is all about identifying network security weaknesses before they are exploited internally or externally. The best pen testers bring a range of tools and experience to each gig and a key tool they will use is vulnerability assessment. The experience level, tools used, findings and the report you get from each penetration tes...
Jul 9, 2018 1:03:01 PM

Vulnerability Management Software, an Essential Piece of the Security Puzzle

  Vulnerability Management Software No single security solution can make a network safe from all attacks. Firewalls and IPS can't keep workstations free of viruses and malware. Antivirus can't protect the data on a database server. So it's a matter of balancing multiple solutions. To understand how these solutions complement each other, let's look at some of the most common security solutions (thi...