Configuration: the forgotten side of security

Thursday, 14 December 2006, 10:43 AM EST

When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses to a specific threat. Such measures play a role in securing a workstation or a network, but they are often less than half the story. A more efficient approach is to configure a system securely from the start. Yet the realities of the software market and IT management, as well as efforts to increase user convenience, often mean that security by configuration is neglected, despite the straightforwardness of most of the steps needed to obtain it.

At Linux.com

[ Read more ]




Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //