Security policy News
September 18, 2017
Through Aruba 360 Secure Fabric, partners can tap into the network security capabilities of the vendor's portfolio, which features IntroSpect UEBA and ClearPass technology.
August 11, 2017
Microsoft antivirus policy changes for Windows 10 Fall Creators Update in order to avoid further action in an antitrust case brought by Kaspersky.
July 28, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.
May 23, 2017
The new Citrix Workspace will give users access to apps -- and let IT enforce policies -- based on their device type, network, location and other factors.
Security policy Get Started
Bring yourself up to speed with our introductory content
A solid application security strategy today must include varieties like cloud apps and mobile. Learn how to set application security policies and practices that keep hackers out. Continue Reading
Setting up a SOC is different for every enterprise, but there are some fundamental steps with which to start. Expert Steven Weil outlines the basics for a security operations center. Continue Reading
Cybersecurity insurance is becoming more important to enterprises as threats increase. Sean Martin explains why enterprise departments need to work together to acquire it. Continue Reading
Evaluate Security policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As network administrators move beyond traditional network segmentation, creating a good network microsegmentation strategy across the enterprise is essential. Continue Reading
Fueled by cloud security concerns, the CASB market is expected to boom into a $713 million opportunity by 2020. However, not all customers yet understand the technology. Continue Reading
While EFSS technology is well-established, enterprises are just beginning to see how it allows businesses to effectively secure and share their files across mobile devices. Continue Reading
Manage Security policy
Learn to apply best practices and optimize your operations.
It is possible for IT administrators to create a close-to-perfect Windows 10 security setup, as long as they know where to look and what tools to use. Continue Reading
Don't store identity and access data in the cloud without first taking cloud access control seriously. Expert Rob Shapland explains the security considerations for enterprises. Continue Reading
The current threat landscape makes cybersecurity breaches seem unavoidable. Expert Peter Sullivan discusses some simple ways enterprises can reduce the risk of a breach. Continue Reading
Problem Solve Security policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Laura Didio of ITIC outlines the top 10 business and procedural must-do steps organizations should take to safeguard the IoT ecosystem and mitigate risk. Continue Reading
Several recent data exposures have involved misconfigured Amazon S3 buckets. Dave Shackleford discusses the importance of proper cloud access control and how to implement it. Continue Reading
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading