957 Results for:USB

  • Sort by: 

EU digital ID reforms should be ‘actively resisted’, say experts

By Alex Scroxton 02 Nov 2023

Over 300 cyber security experts have called for the EU to rethink its proposals for eIDAS digital identity reforms, saying some of the provisions risk damaging user privacy and security Read More

Can you provision desktop apps with Windows To Go?

By Brien Posey 29 Apr 2015

It's OK to install desktops applications on a Windows To Go image, as long as they're small enough to fit on the USB drive and can run locally. Read More

Kali vs. ParrotOS: 2 versatile Linux distros for security pros

By Damon Garn 08 Dec 2023

Network security doesn't always require expensive software. Two Linux distributions -- Kali Linux and ParrotOS -- can help enterprises fill in their security gaps. Read More

Include defensive security in your cybersecurity strategy

By Kyle Johnson 31 Jan 2022

Is your company's cybersecurity strategy comprehensive enough to protect against an expanding threat landscape? Learn how developing defensive security strategies can help. Read More

6 Mac antivirus options to improve internet security

By Robert Sheldon 20 Apr 2023

Organizations with macOS desktops under their management need to ensure their security products can support Macs. Review these six antivirus products with macOS support. Read More

Configure USB devices to Linux: task 2.4

01 Feb 2007

Configuring USB devices to a Linux system important because most accessories now interface through computers with them. Learn more here. Read More

Apple's M1 Ultra delivers more power for creative pros

By Maxim Tamarov 09 Mar 2022

The latest iteration of Apple's proprietary chip will power the Mac Studio workstation, a replacement for the Mac Pro and the last model to get the M1 series chip. Read More

Advice for beginner computer forensic investigators

By Kyle Johnson 28 Oct 2022

For those interesting in becoming a computer forensics investigator, learn about the career and what to expect, as well as why digital evidence is the most volatile evidence. Read More

6 stages of the ransomware lifecycle

By Andrew Froehlich 08 Sep 2023

Know thy enemy. By understanding the nuances of the ransomware lifecycle, enterprise security teams can best protect their organizations from attacks. Read More

Four valuable Citrix HDX protocol features

By Eddie Lockhart 28 Jul 2016

Citrix HDX protocol allows VDI shops to deliver HD quality virtual desktops and apps to users. It combines data deduplication, mobile SDKs, USB redirection and more. Read More