Data centre news, training and research -

Search: security

More Results

Sort by: Relevance | Date
  • security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards...

  • security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.

  • security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that...

  • security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness. 

  • Security operations centers could be key to better security

    Video: Security operations centers are critical to continuous network monitoring and detecting data breaches. Eric Cole discusses SOCs and the role security automation plays in them.

  • New Pulse Secure CEO on what mobile security lacks

    Mobile security has come a long way, but organizations still have to address many sizable gaps.

  • The cost of security for UK business

    First announced during The Queen’s Speech in 2012, the Draft Communications Data Bill, as it was known then, was met with widespread criticism,...

  • endpoint security management

    Endpoint security management requires endpoint devices to comply with specific security policies before they are granted access to network resources.

  • authenticated security scan

    An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an...

  • Virtual desktop security guide

    To secure virtual desktops, consider antivirus, certificates and network vulnerabilities. Just remember, VDI doesn't always increase desktop security.

Search Again: