Kevin Beaver Principle Logic, LLC blog Enterprise Desktop Windows 10 security tools to have handy 13 Jun 2017 Security To secure Office 365, take advantage of controls Microsoft offers 12 Jun 2017 Security Office 365 security features: As good as it gets? 12 Jun 2017 Security Address Office 365 security concerns while enjoying its benefits 12 Jun 2017 Security What the end of hot patching mobile apps means for enterprise security 17 May 2017 Security How to identify and address overlooked web security vulnerabilities 09 May 2017 Security DLP systems: Spotting weaknesses and improving management 30 Mar 2017 Security Android VPN apps: How to address privacy and security issues 28 Mar 2017 Security Preventing DoS attacks: The best ways to defend the enterprise 31 Jan 2017 Security Monitoring outbound traffic on your network: What to look for 24 Jan 2017 Security Best practices for an information security assessment 12 Jul 2016 Enterprise Desktop Windows POSReady 2009 registry hack brings back Windows XP updates 27 Jun 2016 Security What enterprises need to know about Internet traffic blocking 07 Mar 2016 Security Should the Netdump flaw deter enterprise ODL SDN use? 09 Sep 2015 Enterprise Desktop Why you should remove local administrator rights once and for all 23 Jul 2015 Security State of the Network study: How security tasks are dominating IT staff 19 Jun 2015 Security The secrets of proper firewall maintenance and security testing techniques 06 Apr 2015 Security What are the secrets to SIEM deployment success? 25 Mar 2015 SearchWindowsServer IIS exploits in Windows Server and how you can fix them 24 Feb 2015 Security Benefits of the Cisco OpenSOC security analytics framework 17 Feb 2015 Security How emerging threat intelligence tools affect network security 02 Feb 2015 Enterprise Desktop Tighten Windows 8.1 security in five simple steps 28 Jan 2015 Security Lessons learned: Network security implications of Shellshock 13 Jan 2015 SearchWindowsServer Hidden vulnerabilities on your IIS 8 servers 31 Oct 2014 Security Authenticated vulnerability scanning: How much do you know? 19 Aug 2014 Security Big data security analytics: Facebook's ThreatData framework 22 Jul 2014 Software Quality Proactive additions shore up forms-based authentication 17 Jun 2014 Enterprise Desktop Before you clone HDD to SSD, know the benefits and danger to data 30 Dec 2013 Enterprise Desktop Locking down Internet Explorer settings with Group Policy in IE 11 11 Dec 2013 Enterprise Desktop Windows Server Update Services weaknesses you may not know about 22 Jan 2013 Enterprise Desktop Microsoft Office 2013 crackable, so look to Office password recovery 07 Jan 2013 SearchWindowsServer How vulnerable is Microsoft IIS 7.5 to attacks? 09 Dec 2010 Data Center Common security flaws to check for on your Linux-based Web systems 31 Mar 2010 Software Quality Why use POST vs. GET to keep applications secure 09 Feb 2010 Enterprise Desktop Securing removable drives with BitLocker To Go 27 Jan 2010 Security Lack of incident response plan leaves hole in compliance strategy 22 Jan 2010 Enterprise Desktop Using BitLocker in Windows 7 01 Dec 2009 Disaster Recovery What's the difference between a disaster recovery plan and a business continuity plan? 02 Nov 2009 CIO Why it may not be ideal for your lawyer to be your compliance officer 19 May 2009 Enterprise Desktop Using Sysinternals tools in security management scenarios 18 Feb 2009 Enterprise Desktop Sysinternals tools: A must-have for every Windows security toolbox 06 Feb 2009 Software Quality Web application security testing checklist 03 Feb 2009 Enterprise Desktop The 10 most common Windows security vulnerabilities 24 Sep 2008 Enterprise Desktop Metasploit 3.1 updates improve Windows penetration testing 18 Mar 2008 Security Ten hacker tricks to exploit SQL Server systems 17 Jan 2008 Software Quality Cracking passwords the Web application way 17 Dec 2007 Enterprise Desktop Find Windows vulnerabilities with a hex editor 18 Sep 2007 Software Quality What to look for in a Web application security testing tool 23 Jun 2007 ComputerWeekly.com Wireless network security testing 30 Oct 2006 ComputerWeekly.com BackTrack: The gotta-have, free, network security tool you've never heard of 29 Aug 2006 Networking Run your VoIP calls over a VPN for enhanced security 10 Aug 2004 1 2