Please turn on your JavaScript for this page to function normally.
whitelisting
Majority of IT departments leave major holes in their USB drive security
For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security …
How attackers exploit whitelists
If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way …
Guide to application whitelisting
The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting to help thwart malicious software from gaining …
Featured news
Resources
Don't miss
- A year in, Zoom’s CISO reflects on balancing security and business
- Scenario: Open-source framework for automated AI app red-teaming
- GDPR works, but only where someone enforces it
- New Mirai variants target routers and DVRs in parallel campaigns
- Progress Software fixes sneaky WAF bypass vulnerability (CVE-2026-21876)