Topics Archive
New & Notable
Topics Archive News
-
April 11, 2022
11
Apr'22
SolarWinds breach news center
The massive SolarWinds supply chain attack continues to invade networks. Here's the latest news on the breach, how the malware infiltrates systems and the IT industry response.
-
January 12, 2022
12
Jan'22
Exchange Server woes continue on January Patch Tuesday
Exchange Server admins who had to cope with a Y2K22 error to start the new year have three more vulnerabilities of varying levels of severity to resolve for Patch Tuesday.
-
November 10, 2021
10
Nov'21
Exchange zero-day corrected on November Patch Tuesday
Microsoft released a security update to shut down a publicly exploited vulnerability in the beleaguered on-premises messaging platform.
-
October 29, 2021
29
Oct'21
Europol 'targets' 12 suspects in ransomware bust
Europol has not said whether the suspected ransomware actors were arrested or detained, but the 12 were allegedly involved in attacks that affected 1,800 victims in 71 countries.
Topics Archive Get Started
Bring yourself up to speed with our introductory content
-
Great Firewall of China
The Great Firewall of China is the name that western media has given to the combination of tools, services and rules that the government of the People's Republic of China uses to block certain internet content from those within China's borders. Continue Reading
-
SolarWinds hack explained: Everything you need to know
Hackers targeted SolarWinds by deploying malicious code into its Orion IT monitoring and management software used by thousands of enterprises and government agencies worldwide. Continue Reading
-
encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning. Continue Reading
Evaluate Topics Archive Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
8 WSUS alternatives for patch management
Compare the features and functionality of eight prominent patch management tools for Microsoft OSes and third-party applications to find the right option for your organization. Continue Reading
-
What Microsoft Defender Antivirus features are on Windows?
While there are plenty of viable enterprise-grade third-party desktop security platforms, Microsoft has built out a strong array of native features that IT admins can utilize. Continue Reading
-
10 cybersecurity certifications to boost your career in 2022
A consensus of industry professionals rank these 10 security certifications as the most coveted by employers and security pros. Continue Reading
Manage Topics Archive
Learn to apply best practices and optimize your operations.
-
Key software patch testing best practices
Every company has to update and patch its software, but unless the process is carefully managed, serious problems can occur. How can you make sure you're following the right steps? Continue Reading
-
7 enterprise patch management best practices
It might not be the most exciting responsibility, but the value of a well-executed patch management strategy can't be denied. Use these best practices to build a smooth process. Continue Reading
-
3 steps for CDOs to ensure data sovereignty in the cloud
Data sovereignty regulations, combined with a tsunami of data growth and increased cloud usage, have created a perfect storm that chief data officers must manage. Continue Reading
Problem Solve Topics Archive Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Are 14-character minimum-length passwords secure enough?
When it comes to minimum password length, 14-character passwords are generally considered secure, but they may not be enough to keep your enterprise safe. Continue Reading
-
10 IoT security challenges and how to overcome them
IoT, while influential and beneficial, introduces several enterprise security issues. Key risks of IoT include network vulnerabilities and outdated software and firmware. Continue Reading
-
Top 5 IoT security threats and risks to prioritize
Certain IoT security concerns are hard to forget, such as IoT botnets, but others might not come to mind as easily, including DNS threats and physical device attacks. Continue Reading