Windows Server 2003

Security strategy News

  • June 23, 2017 23 Jun'17

    Managing asymmetrical network traffic flows

    This week, bloggers look into how to manage asymmetrical network traffic flows, Broadcom Trident telemetry and cloud security as part of a data protection strategy.

  • June 13, 2017 13 Jun'17

    (ISC)2 CEO on cybersecurity workforce expansion and 2017 Congress

    Recently, SearchSecurity editorial director Robert Richardson checked in with (ISC)2's CEO David Shearer as the organization prepares for its fall Security Congress.

  • May 07, 2017 07 May'17

    Email security retrospection

    Keeping anything safe and secure involves multiple considerations. Avoid putting yourself in danger, put up a protective ‘shield’, detect when that is compromised, take mitigating action. When it ...

  • May 02, 2017 02 May'17

    NATO cyberwar games show the U.S. needs more practice

    The NATO Locked Shields cyberwar games had the U.S. team winning most improved, but experts say the U.S. still needs more practice.

View All News

Security strategy Get Started

Bring yourself up to speed with our introductory content

  • The art of managing IT risk is never quite mastered

    Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.

    While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.

    This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.

    In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.

    Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.

     Continue Reading

  • How threat intelligence feeds aid organizations' security posture

    This Security School explores how threat intelligence feeds works and discusses the types of vendor services that exist now. Continue Reading

  • Spotting a system breach takes defensive and offensive strategies

    A system breach is inevitable, and BDS products provide a valuable means of detection. But a strategy that blends both defense and offense is the best approach to security. Continue Reading

View All Get Started

Evaluate Security strategy Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security strategy

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security strategy Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve