Configuring for security in a world of 0-days
by Wolfgang Kandek - CTO at Qualys - Monday, 16 December 2013.
Fast patching of vulnerabilities continues to be the most important cornerstone of a successful security program, providing workstations security inside and outside of corporate networks. But even for non-patchable vulnerabilities, there are security measures available that counter attackers’ attempts, make their lives harder and incentivize them to find different targets.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //