CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (303)
    • Data Center (323)
    • Digital Workspace (462)
    • Networking (261)
    • Security (309)
    • Software (321)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Patching or IPS

By Jesse Wiener
|
March 30, 2015
Data Center

I heard a question the other day that caught me off guard. “Why do you guys even sell IPS (Intrusion Prevention Systems), is there even value in that anymore? Shouldn’t you just recommend patching vulnerable systems?” 

Read More   

At-a-Glance Guidelines: Understanding the Federal Criminal Justice Information Services Security Policy

By Matthew Parnofiello
|
October 28, 2014
Security

The Policy applies to the full lifecycle of CJI including its creation, viewing, modification, transmission, dissemination, storage and eventual destruction. The release of CJIS Policy Version 5.3 in August of this year takes into account the sweeping changes mobile technology has brought to the front lines of public safety services. Executive Summary The CJIS Security…

Read More   

Shellshock Bug Exploits Bash Defect – Steps to Limit Attacks

By CDW Expert
|
September 30, 2014
Security

The big security news last week was Shellshock, a vulnerability that affects the Bash shell on *nix operating systems (including Macs). So good news, Windows admins, you get to sit this one out. For the rest of the world, the impact of Shellshock is still unclear and perhaps that’s what is making it most unsettling….

Read More   

The Russian Password “Store” – 1.2 Billion Reasons to Be Concerned about Security, or Ho-Hum?

By CDW Expert
|
August 20, 2014
Security

We are in the middle of security conference season. Therefore, it’s not entirely unexpected to see headlines from Black Hat and other conferences discussing “grave” security threats, and what they mean to our ability to protect our organizations and ourselves.

Read More   

What You Need for an Effective HIPAA Security Risk Assessment

By CDW Expert
|
August 14, 2014
Security

Good risk assessments tend to include at least three distinct assessment components of varying complexity, followed by a good reporting system with internal and external checks and balances. While specifically designed for the Health Insurance Portability and Accountability Act (HIPAA), this general methodology could be used for any assessment project with a compliance component. For…

Read More   

Don’t Let Heartbleed Break Your Heart

By CDW Expert
|
April 16, 2014
Security

The recently publicized “Heartbleed” SSL/TLS bug has received a tremendous amount of media coverage and, deservedly, a significant amount of concern amongst the IT security community. Rather than rehash the same information that has been shared repeatedly, I would like to offer some philosophical commentary, concise guidance, and additional resources to the IT community as…

Read More   
  • 1 (current)
  • 2
  • 3
  • 4
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved