logo
December 2, 2021 | Jeremy Moskowitz

Oracle Java License Change: Everything You Need to Know

The Oracle Java license change has become a hot topic amongst information technology professionals. As of January 2019, administrators who install Java 8 U 202 and later are only able to get security updates when they purchase support for each desktop. Furthermore, Java 11 and above is only...
February 11, 2015 | Russell Smith

Secure PowerShell Remoting Using Constrained Endpoints

PowerShell Remoting is enabled in Windows Server 2012 (and later) out-of-the-box, and while many IT shops see this as a potential security risk, PowerShell is in fact one of the most secure ways to administer servers if best practices are followed. In this article, I’m going to show you how to...
September 23, 2014 | John O'Neill Sr.

Endpoint Protection vs Modern Threats

As IT professionals, it’s our responsibility to do everything within our power to protect our organizations from IT security threats. Unfortunately, all too often I hear fellow IT pros express an almost universal confidence in endpoint protection as the be-all, end-all to combating these threats....
February 25, 2014 | Nick Cavalancia

What's Getting Lost in Your Log Data?

When stories come up in the news about data breaches, if you're like me, you tend to gloss over them if they seem similar to something you've already read.  I almost did that today.  But something in this story really got my attention. There's a story this week about Neiman Marcus being hit...
March 2, 2011 | Stephen Schimmel

Netwrix’s Jeff Melnick Talks Endpoint Security With Help Net Security Editor In Chief

Netwrix's own Jeff Melnick recently sat down for a discussion with Help Net Security Editor In Chief Mirko Zorz to discuss the complex world of endpoint security. Melnick and Zork spoke in detail about the challenges associated with end point client protection, the influx of potentially hazardous...
...