Information Security Leader, Author, Instructor and Speaker

Default utility Image

Malware Exposed TAGS: | Malware is perhaps the most dangerous threat to the security of the average computer system. Research by Microsoft recently estimated …Continue reading →

Default utility Image

The Discipline of Malware Management TAGS: | Ask many IT professionals about the status of their malware management efforts and you’ll often hear responses like “Oh, we …Continue reading →

Default utility Image

ESET NOD32 Antivirus TAGS: | | NOD32 allows administrators to apply policy to individual systems or groups of systems through the remote administrator feature. Policy control …Continue reading →

Default utility Image

RSS: The next malware target? TAGS: | Those of us who have been around the information security profession for a while have come to recognize a familiar …Continue reading →

Default utility Image

Antispyware: Blue Coat Systems’ Spyware Interceptor SI-1 TAGS: | | Interceptor SI-1 is one of the first products to approach spyware from a network-based perspective, protecting devices behind the gateway–a …Continue reading →

Default utility Image

Sunbelt Software’s CounterSpy Enterprise 1.5 Product Review TAGS: | The swift emergence of spyware as a serious business problem has forced organizations to divert money and resources to address …Continue reading →

Default utility Image

Esafe 4.0 TAGS: | | | Content filtering typically means a mix of antivirus and antispam software, and a variety of e-mail, IM, Web and URL …Continue reading →

Default utility Image

Tools for combating spyware in the enterprise TAGS: | You’ve probably seen the buzz in both the trade and consumer press about the threat spyware applications pose to user …Continue reading →

Default utility Image

Understanding malware: A lesson in vocabulary TAGS: | Viruses, worms, Trojan horses – the terminology of malicious code sounds like some strange mix between a medical reference and …Continue reading →