Configuration: the forgotten side of security

Thursday, 14 December 2006, 10:43 AM EST

When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses to a specific threat. Such measures play a role in securing a workstation or a network, but they are often less than half the story. A more efficient approach is to configure a system securely from the start. Yet the realities of the software market and IT management, as well as efforts to increase user convenience, often mean that security by configuration is neglected, despite the straightforwardness of most of the steps needed to obtain it.

At Linux.com

[ Read more ]




Spotlight

Dissecting the unpredictable DDoS landscape

Posted on 23 April 2014.  |  DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and brand damage, according to Neustar.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //