The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. These increasingly ...
Allowing the use of only trusted applications — instead of blocking only known threats — can prevent malware from entering an agency's network. The use of blacklisting as a form of cybersecurity ...
“Data-Driven Thinking” is written by members of the media community and contains fresh ideas on the digital revolution in media. Today’s column is written by Craig Spiezle, CEO and executive director ...
With the brand safety scandal raging on since March of this year, one term that keeps cropping up as a potential solution is ‘whitelisting’. ExchangeWire delves into whether whitelisting really is the ...
Military computers soon will be configured to execute only administrator-approved software applications in certain areas of a computer, Pentagon officials told Nextgov. The Defense Department's unique ...
In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a ...
The customer is the real referee when it comes to judging whether whitelisting or blacklisting is superior Whitelisting: If it’s not on the list, it’s not coming in The fundamental principle that ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. McAfee and Bit9 products tied the technological knot ...
Russell Smith has been in the IT field for more than 30 years, doing break/fix, custom PC builds, small-business network design and maintenance and more. He’s currently doing network administration ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results