Solutions Blog

Solutions Blog Insights From Experts Who Get IT

  • Topics
    • Cloud (246)
    • Data Center (284)
    • Digital Workspace (372)
    • Networking (220)
    • Security (240)
    • Software (247)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

A New Cybersecurity Approach for Evolving Email Threats

Next-generation security tools focus on getting ahead of attackers, rather than playing catch-up.

By Paul Shelton
|
February 28, 2017
Security

Few email users fork over their bank account numbers to Nigerian princes or click links to claim lottery prizes anymore. In fact, as digital natives enter the workforce, the collective sophistication of email users grows. Yet email scams are still big business. That’s because while users are increasingly savvy, so are the bad actors. Today’s…

Read More   

Patching or IPS

By Jesse Wiener
|
March 30, 2015
Data Center

I heard a question the other day that caught me off guard. “Why do you guys even sell IPS (Intrusion Prevention Systems), is there even value in that anymore? Shouldn’t you just recommend patching vulnerable systems?” 

Read More   

Product Review: Tenable Nessus Vulnerability Scanner

By Jeremy Weiss
|
February 12, 2015
Security

Vulnerability scanning and reporting are becoming a driving need within healthcare.  As advanced persistent threats or APTs are on the rise and constant exploits are being found, IT staffs are not always able to patch/update healthcare systems due to equipment guidelines. Having the tools in place to see potential issues and mitigate risk helps IT…

Read More   

At-a-Glance Guidelines: Understanding the Federal Criminal Justice Information Services Security Policy

By Matthew Parnofiello
|
October 28, 2014
Security

Our nation’s state and local law enforcement agencies have looked to the FBI’s Criminal Justice Information Services (CJIS) Security Policy for many years to set the standard for security requirements in the industry. The CJIS Policy dictates the minimum level of security requirements while providing guidelines and agreements for organizations to protect the transmission, storage…

Read More   

Shellshock Bug Exploits Bash Defect – Steps to Limit Attacks

By CDW Expert
|
September 30, 2014
Security

The big security news last week was Shellshock, a vulnerability that affects the Bash shell on *nix operating systems (including Macs). So good news, Windows admins, you get to sit this one out. For the rest of the world, the impact of Shellshock is still unclear and perhaps that’s what is making it most unsettling….

Read More   

The Russian Password “Store” – 1.2 Billion Reasons to Be Concerned about Security, or Ho-Hum?

By CDW Expert
|
August 20, 2014
Security

We are in the middle of security conference season. Therefore, it’s not entirely unexpected to see headlines from Black Hat and other conferences discussing “grave” security threats, and what they mean to our ability to protect our organizations and ourselves.

Read More   
  1. Pages:
  2. 1
  3. 2
  4. 3
  5. 4
  6. »
  • 1 (current)
  • 2
  • 3
  • 4
Recommended for You

Most Popular
Digital Workspace | Security

Mobile Security Is at the Heart of Modern Device Design

Networking | Security

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

Data Center | Security

How to Handle GDPR Data Subject Access Requests

Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2019 CDW. All Rights Reserved