The endpoint and the end user continue to be the weakest links in most security infrastructures. Commonly used as a security tactic, blacklisting looks at known pieces of malware and adds to a list ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Thirty years ago IBM launched ...
QUESTION: I was told that I should use application whitelisting to protect my computer; do you agree and if so, how do I do it? ANSWER: Technically speaking, application whitelisting is a very good ...
Not too long ago, application whitelisting as a form of IT security was looked upon as being far too restrictive a measure for most end users to accept. Fast forward a few years and several ...
Thirty years ago IBM launched the XT5160 — the first hard drive DOS-based PC. But the computer virus, nowadays so seemingly tied to the PC, actually appeared almost a decade earlier. It took until ...