Blog
Tags: Security & Compliance MVP
Data-Stealing Drones, Insta-GramScamming, and Google Yanks Huawei’s Android License
This week’s security snacks:
Tags: Security & Compliance MVP
Matrix-Themed Ransomware and Malware Vulnerability-Scanning the Internet
MegaCortex Sends Your Data Down the Rabbit Hole Bite The latest in the long line of ransomware variants, MegaCortex is a nod to a particular Keanu Ree...
Tags: Security & Compliance MVP
Windows Patch Breaks AV, PDF Malware on the Rise, Password “123456” Is Super Popular
Windows Patch Breaks AV except on Windows 10 Bite Third-party anti-malware solutions are having issues with the latest Windows 7/8 (and older Windows ...
Tags: Security & Compliance MVP
Ransomware Tears, Virtual Not-So-Private Network, and The New Urgent Windows CVE
This week’s security snacks:
Tags: Security & Compliance MVP
19-year-old WinRAR Vulnerability, Are Password Managers More Good Than Evil?
This week’s snacks include: 19-Year-Old WinRAR Security Bug Finally Patched! IIS Bug Allows DoS Attacks to Force 100% CPU Usage Think You Are Safe wit...
Tags: Tech Talk Security & Compliance
Expanding the Windows 10 Security Stack with Device Health Attestation
Cybersecurity is a daily struggle for business. Companies need to be alert to the hacks and data breaches that are becoming increasingly common. Windo...
Tags: OneSite Health Product Security & Compliance
Windows Updates: How Adaptiva OneSite Health Can Help Improve Total Coverage
Security is definitely a hot topic at the moment. ITSec is becoming relied upon more and more within organizations as hackers get much more advanced i...
Tags: Tech Talk Security & Compliance
Infographic: Windows 10 Security Primer
IT pros worldwide agree that Microsoft Windows 10 is a security must-have for enterprises. In an Enterprise Endpoint Security Survey, respondents rank...
Tags: Security & Compliance
Credential Guard Cheat Sheet
Why You Need Credential Guard Security is an ever increasingly important part of our everyday lives. Traditional approaches such as the use of credent...
Tags: Tech Talk Security & Compliance
The Whys and Wheres of Windows Defender Device Guard
A Quick Overview Look back over the history of computing, and you will see that users have typically been rather too trusting when running application...
Tags: Tech Talk Security & Compliance
AppLocker: Why You Need It and How to Use It Wisely
A Quick Overview One of your company’s biggest cybersecurity risks lies in the one of the most common employee activities: running applications. More ...
Tags: Tech Talk Security & Compliance MVP
BitLocker Basics: Don’t Miss Out on Security
BitLocker disk encryption technology has been a part of the Windows operating system since Windows Vista. It didn’t really hit its stride until Window...
FEATURED
Streamline Patching Workflows and Expedite Patch Compliance with Automated Approval Chains
Rev Up Your Endpoint Security with Adaptiva at These Upcoming Events
Adaptable Automation: Balancing Speed With Enterprise Complexities
Accelerate Critical Updates and Control Patching Automation with Deployment Bots
Practitioner Series
In these blog posts, we share what we know about managing endpoints. Stop by to hear from our own in-house subject matter experts. We are excited to discuss best practices, technical how-tos, and other topics we think you'll find valuable. Our solution architects, product experts, and own IT practitioners have seen and done it all. We are adding new content regularly and are happy to have you here.