Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
"In Configuration We Trust" offers simple, practical steps to dramatically improve security posture without investing in new technology. This report from the BeyondTrust Research Team offers configuration best practices related to VLANs and IPSec, proxies, disabling WebDAV, as well as insights on why organizations should upgrade their Microsoft software, how to best utilize penetration testing, and more.
No comments:
Post a Comment