Featured

Contributor:
Dan Raywood
December 11th, 2015

Responding to a breach: The importance of clear communication

In my last blog, I looked at examples of the commercial impact on a company in the instance of a data breach.

The correct method of dealing with a data breach contains many actions including containment, employee engagement and making sure it never happens again, but part of your plan should include planning how to get your message out there and let your investors and customers know what the latest status is.

Continue Reading

Privilege Guard 2.7 and Enhanced UAC Integration

Privilege Guard (Edit: now Defendpoint) first introduced UAC (User Account Control) integration in version 2.5, which enables rules to be defined that trigger when an application requires administrator privileges in order to run. Further enhancements to the UAC rule in version 2.7 now allow you to elevate applications that may trigger UAC after the application has already launched. For instance, disk defragmenter and task manager are two applications that launch with standard user rights and only trigger UAC when the user attempts to perform an operation that requires administrator privileges.

Continue Reading


Windows Security Catalogs and Effective Application Control

Solutions that provide application whitelisting or application control need to provide the administrator with a set of rules that can be used to precisely identify applications. The most common types of rule will check the file name or certain attributes of the file, as these rules are relatively simple to maintain, and in most circumstances will provide adequate protection, assuming a least privilege approach is in place, where users can’t tamper with application files.

Continue Reading