You are the content you publish.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook or a Twitter account
Start a free trial of Scoop.it Business
Are you sure you want to delete this scoop?
UserLock 7 secures Windows network access. Limit logins and control user access by session type (including Wi-Fi) and by user, user group or organization unit.
UserLock, a unique network security access control solution, was chosen by a leading Global Banking Group to eliminate login sharing and secure their Windows network.
Taking User Access Control beyond Native Windows functionality. This case study examines how a leading Global Bank eliminated the issue of user login sharing.
Need to know what to keep an eye out for on the IT security front? Check out our list of seven infosec trends you should keep an eye on.
Very good summary of the RSA Conf by Jeff James ...
This bulletin summary lists security bulletins released for March 2013.
7 bulletins, 4 "Critical", 3 "Important" ...
FileAudit 4 has been reviewed as “excellent”, according to PC Mag and described as “an easy yet robust tool for auditing files and folders that reside on Windows systems”.
See by yourself: download a free, fully-functional trial version!
Tom Olzak details the insider threats that an organization should be prepared to defend.
Interesting overview of the insider threat landscape by Tom Olzak.
If you intend (and you should) to implement and enforce an efficient User Access Control Policy for your Windows and Active Directory network, give a look to UserLock.
Microsoft has lined up a bumper Patch Tuesday this month to snap shut a backbreaking 57 security vulnerabilities in its products.
Prepare to a busy Tuesday next week ...
Learn about important security-related changes in Windows Server 2012 Active Directory, including Dynamic Access Control and more.
Great, in-depth article ...
For most security professionals, building a budget is unfamiliar territory. Here are a few tips to help you navigate
Insightful guidance here ...
The number of annual security incidents caused by insider threats is increasing.
Insider threats are certainly the most significant (and underestimated) threat faced by organizations today ...
Microsoft's antivirus failed to achieve certification in the two most recent reports from AV-Test. According to Microsoft sources, the reason is customer-focused prioritization; their customers weren't affected by the samples used in testing.
There is no way AV vendors agree on a "malware representative sample" ...
Microsoft today shipped an emergency update for Internet Explorer to stymie attacks that have been occurring since at least Dec. 7.
Upgrade to Internet Explorer 9 or 10 ...
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy?
The challenge is an important one to tackle, with insider-related fraud up 43% in 2012 ...
Mobility is powering new learning methods and opening the door for major security risks.
Whilst this is a huge opportunity for professors and students to engage in new learning styles — it's also an opportunity for hackers and criminals to gain access to networks and potential sensitive data.
How to make BYOD work? Organizations need to secure their wireless networks and offer security to BYOD. Software that allows you to secure network access across all sessions types - including Wi-Fi and VPN permit an organization to control their wireless networks and offer security to BYOD.
Happy to say the new UserLock 7 offers Wi-Fi session control to mitigate BYOD risk and strengthen the first line of defense in a Windows Network.
Bruce Schneier says training end users on security is a waste of time. But security awareness experts argue there's a whole new generation and approach emerging that better schools users on security behaviors.
Let's keep balanced here: technological and human issues need to be simultaneously adressed when it comes to insider threat!
From managers who steal to innocent employees who are duped, the insider threat is evolving. Researchers Dawn Cappelli and Randy Trzeciak share their latest insight
Really worth watching video about a too often underestimated threat ...
At RSA Conference 2013, the CERT Insider Threat Center details cases of insider threats, in which cybercrime and cyberthreats can have costly and embarrassing consequences.
Malicious insiders pose an often-underestimated threat to IT security, but can be efficiently mitigated using IS Decisions software solutions:
- UserLock allows an easy implementation and a strict enforcement of a customized User Access Control Policy for Windows networks and Active Directory.
- FileAudit proactively tracks, audits, reports and alerts on all access to files and folders on Windows servers.
Using FileAudit is the easiest way to proactively track, audit, report and alert on all access to files and folders on Windows servers.
FileAudit 4 the first and only File System Auditing Solution to be officially Windows 8 and Windows Server 2012 certified by Microsoft.
Download a free, fully-functional trial and see by yourself!
Security is a huge concern when it comes to BYOD. Here are several steps you can take to protect your network and keep your organization’s data
Insightful advice by Jack Wallen ...
The BYOD world isn't going anywhere, so best to start tackling the list.
This is an advance notification of security bulletins that Microsoft is intending to release on February 12, 2013.
11 security bulletins, 5 of them are labeled as critical ...
Hitler learns a painful lesson about Cloud Computing security.
Hilarious AND educational ...
Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point of view may help make it more tolerable.
A marriage that needs to be successful however ...
Practical tips on how to build a comprehensive business continuity and recovery plan for your business.
Insightful advice by Mark Brown (CISO at Ernst & Young) ...
Windows 8 will become more popular in 2013, but how effective is it at stopping malware? It could become a new target for cybercriminals within months.
Windows 8 will of course become a more popular target as its market share increases, but will that make it an easy target? Not sure ...
Last year Microsoft's Patch Tuesdays featured a total of 83 bulletins, which is a decline from previous years. Since their security efforts impact countless security professionals, we wanted to see what IT security leaders, and Microsoft, think about the patches released in 2012.
Interesting points of view here ...