Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Content

Application whitelisting: The white knight

Angela MoscaritoloOctober 24, 2011
app whitelist 0310While whitelisting technology, the process of defining which applications can run on a client machine, has been around for 10 years, lately it has gained new buzz. It has become abundantly clear that anti-virus companies are lagging in the struggle to keep up with the rise in malware, a problem that experts say will elevate application whitelisting technology from just a good idea to a mainstream, widely deployed security defense. This ebook from SC Magazine examines the topic, picking the brains of a number of experts in the field to assess the latest developments as technology advances have seen numerous whitelisting tools become available today that have made the solution more flexible and workable for the mainstream desktop environment.
Angela Moscaritolo
Angela Moscaritolo

Related

Threat intelligence
Majority of YouTube accounts Google terminated in Q3 linked to China

Steve ZurierAugust 29, 2022

While some of the 1,546 YouTube channels terminated by Google emanated from Russia, the vast majority blocked were linked to China.

Content
Research partnership to examine how fraudsters abuse financial tech innovations

Bradley BarthJuly 2, 2021

Federal Reserve Bank of Atlanta and GSU team will study P2P and mobile payments, e-wallets, and central bank digital currencies.

Content
Feds file new charges against Amazon employee that leveraged server access to hack Capital One

Steve ZurierJuly 1, 2021

The Amazon employee used knowledge she gained working at the company, along with scripts, to scan Amazon Web Service servers for misconfigured web application firewalls.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.