- Tools 4 Free Tools to Detect Local Insecure Browser Plugins
Four free tools can identify locally-installed browser plugins that need security patches: Google Chrome's built-in warnings and Secbrowsing extension, Mozilla's Plugin Check page, Qualys...
- Networking The Hidden Costs of Information Security Projects
Security projects often underestimate hidden costs: requirements gathering, transitioning from current solutions, project oversight, validation of completion, and personnel training. Applying Total...
- Malware Protect Files From Malware With Windows Integrity Levels
Windows integrity levels can protect sensitive files from malware. Use the Chml tool to set a file to High integrity level with "no read up" policy enabled. Since malware typically runs at Medium...
- Networking Web Application Firewalls (WAFs) Will Be Ubiquitous
WAFs are following the adoption trajectory of traditional network firewalls—both mitigate risk when securing individual components is impractical. Network firewalls protected weakly-configured...
- Tools How to Design Security Warning Messages to Protect Users
Effective security warnings make the safest button most visible, stay brief while providing context, avoid technical jargon, and don't overwhelm users with repeated prompts. Microsoft's "Enable...
- Authentication Better Internal Vulnerability Scanning With Authentication
Authenticated vulnerability scans provide far more comprehensive results than anonymous scans by allowing the tool to examine installed applications, patches, and configurations. Create dedicated...