article thumbnail

Securing Linux Policy

Tech Republic Security

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. From the policy: DEVELOP TEMPLATES BASED ON.

Linux 412
article thumbnail

Mobile Device Security Policy

Tech Republic Security

In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops. Desktops are routinely stationary devices and laptops are harder to lose than smartphones or tablets, being more sizable.

Mobile 420
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor

Tech Republic Security

Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level.

Windows 384
article thumbnail

Cisco issues 3 critical warnings around ACI, NS-OX security holes

Network World

Cisco has issued three security advisories rated “critical” for some of its high-end software systems—two aimed at its Application Services Engine (ASE) implementation and one at the NX-OS operating system. To read this article in full, please click here

Security 467
article thumbnail

Arista embraces segmentation as part of its zero-trust security

Network World

The new software, Macro-Segmentation Service (MSS)-Group, expands the company’s MSS security-software family, which currently includes MSS Firewall for setting security policies across customer edge, data-center and campus networks. Additionally, the company’s MSS Host focuses on data-center security policies.

Security 469
article thumbnail

Fortinet targets branch offices with upgraded firewalls

Network World

FortiManager lets customers create and deploy security policies across multiple firewalls, simplifying administration in large, distributed enterprises, according to Fortinet. addition, FortiGate customers can use FortiAI to support incident analysis and threat remediation.

Firewall 222
article thumbnail

How to Create AppLocker Policies to Secure Windows Environments Intune

Anoop

Let’s check how to create AppLocker Policies to Secure Windows Environments. These Applocker policies can help to build appropriate Windows Information Protection (WIP) using Intune. Introduction Applocker is introduced with the Windows 7 operating system, Windows Server 2008 R2. Subscribe YouTube Channel [link].

Policies 209