Microsoft Windows desktop operating systems security management News
December 28, 2006
Security guru Kevin Beaver presents his two cents worth on what he sees happening in the information security world of networks and business operations during the new year.
June 06, 2006
In other news, Microsoft investigates a new Windows flaw; a college loan firm reports missing data on 1.3 million borrowers; and F-Secure patches Web console flaw.
March 22, 2006
For Windows security, open source tools are often an afterthought, but they can be more flexible than Microsoft tools and less costly than third-party tools. Contributor Tony Bradley reviews a few of the lesser known open source security tools.
February 15, 2006
Can't make it to this year's RSA conference? Ben Vigil, editor of SearchWindowsSecurity.com, shares his thoughts and perspectives on the meetings in this blog.
Microsoft Windows desktop operating systems security management Get Started
Bring yourself up to speed with our introductory content
Cracking passwords is a hot issue for admins who wish to test the security of their networks. Likewise, hardening passwords is critical for those admins who wish to prevent hackers from cracking their passwords. Learn the abc's of password cracking ... Continue Reading
Evaluate Microsoft Windows desktop operating systems security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
New operating systems are always accompanied by compatibility concerns. Windows 8 app compatibility is no different, or is it? Continue Reading
No matter how hard average users try to avoid the dark side of the Web, there is no guarantee of safe Web browsing in the enterprise. These free tools recommended by contributor Tony Bradley will help protect your users (and your network) from ... Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
It makes the discovery of applications and classification of user traffic simple but I'd like to see a roadmap for SSL decryption.Powered by IT Central Station
Valuable Features: I'm most impressed with the visibility and control SourceFire solutions provide in to the types of traffic flowing in and out...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Manage Microsoft Windows desktop operating systems security management
Learn to apply best practices and optimize your operations.
Check out this mid-year review of the most popular Windows desktop security tips; covering notable changes to Windows 7 security features, free security tools and more. Continue Reading
Managing Internet Explorer security is a complicated job. You need to be aware of all of the latest IE flaws and threats as well as how to prevent hackers from using these flaws to hack your Windows network. Read about how you can keep IE secure in ... Continue Reading
Do you have a solid plan in place for if and when you experience a security breach? Does that plan include important contact information, and have you and your co-workers walked through the plan together? This step-by-step guide will help you to set... Continue Reading
Problem Solve Microsoft Windows desktop operating systems security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Group Policy can be used to control wireless access in Windows networks. Find out which Group Policy settings you should create to accomplish this in this tip. Continue Reading
Prevent security vulnerabilities in your system by reducing your Web server's attack surface . Learn the five steps that can help you protect yourself further. Continue Reading
Think you've got IT governance under control? You probably don't, says security guru Kevin Beaver. Read up on the problems you may be facing in your shop (that you're unaware of) and the steps you can take to educate yourself on governance ... Continue Reading