Preventing Known and Unknown Threats
The argument to use multiple anti-malware engines is simple: there is no single anti-malware engine that is consistently the most effective at detecting malware. Learn how to address several security issues that many organizations face including determining how much malware is out there, finding a way to protect against anti-malware engine detection evasion, the perceived advantages and disadvantages of multi-scanning, and how to use technologies such as data sanitization to help prevent threats.
Three Considerations for File Quarantine Configuration
All organizations handle many types of files entering from a variety of digital communication channels, and mitigating the risk of threats while maintaining productivity can be difficult. Utilizing a file quarantine can help administrators with these challenges; learn the top three questions you should be asking about your quarantine process.
Protecting Medical Record Data
After a slew of data breaches in 2014, the FBI warned the healthcare industry that cyber-criminals would be directing more attention their way in 2015. The healthcare industry has become an increasingly attractive target for cyber attacks. What is it about the healthcare industry that has captured the cyber criminals' interest in the last few years, and what can you do to protect your organization?
Best Practices for Detecting Threats in Compressed Files
Compressed and extractable files are a part of our digital landscape. Both at work and at home, most of us see these files on a weekly basis, if not more frequently. They allow us to efficiently transmit large files, improving data flow within government agencies, private organizations, and even family groups. Extractable files are also, unfortunately, an incredibly efficient means for transmitting malware; how can you ensure these threats are not missed by your security solution?
Protecting Critical Infrastructure from Threats
Since most critical infrastructure facilities are isolated from external networks, administrators rely heavily on portable media to transport files to and from secure areas, making them attractive attack vectors for malware-writers, as a means into a secure facility. While some organizations have gone to extreme measures, such as banning peripheral devices, these solutions can limit productivity. Read about how you can achieve a balance between security and productivity.
Identifying Potentially Unwanted Applications
With an ever-changing threat landscape, certain software applications have become difficult to detect and define as potential threats by anti-malware technologies. This type of application is commonly known as a potentially unwanted program (PUP) or a potentially unwanted application (PUA). These applications can open users to vulnerabilities and risk; learn how to recognize these types of applications to protect against the potential risks.
C++ Superglue for Anti-malware Applications
Network Access Control Technologies
Cisco, Microsoft and the Trusted Computing Group are battling to control the keys to locking untrusted endpoints out of networks. Systems should grant access to the network based on factors such as anti-malware protection level, personal firewall assessment, host and user authentication, location, and even time of day.