Content tagged "threat"
- PCI DSS Compliance and S… 2 years ago, 837 views
advanced persistent threats antivirus application control application whitelisting compliance cybercrime data data protection device control endpoint endpoint management endpoint protection endpoint risk endpoint security it it security malware mobile device patch management risk security software threats vulnerability weaponized malware whitelisting more…
"cloud computing" "endpoint management" "endpoint security" "virtual machine" 2.0 20 2011 2012 3rd party patch adobe advanced persistent threats anti-virus antimalware antivirus apple appliation control application application control application white application whitelisting applications applocker attack attack surface audit awareness bitlocker blogging breach byod c care click jacking cloud computing community compliance computer configuration configuration management consumerization of it control control applications corporate data critical information cyber crime cybercrime cybercriminal data data protection device device control device control endpoint security electricty savings encryption end end users endpoiint risk endpoint endpoint amangement endpoint management endpoint operations endpoint protection endpoint risk endpoint security endpoints facebook federawhitelisting firewall firewalls green hard disk drive health health care himss identity management influence information security information system information technology insider threats it it operations it risk it security it strategies java linux local admin local administrator loss lumension malware malware. weaponized malware management marketing media medical memory protection microsoft microsoft windows mobile device nerc network network security new technology on patch patch adobe patch management patch management best practices patches pci pci dss policy ponemon instititute power management power rebates power reduction pr prevent program protect information protection records removable device reporting return risk risk management roi scripts security server signature smb security social social media software spear phishing system technology third party applications threat threat landscape threats twitter university usb usb control usb control insider threats usb enforcement usb flash drive usb security utilities virtualization vulnerabilities vulnerability weaponized malware web web 20 whitelist whitelisting wikileaks windows windows 7 workstation …less