- Home /
Antivirus software protects against known threats by comparing files on a system against a list of known threats stored in virus definition files. It will generally allow all applications to execute if they are not identified as malware in the virus definitions. On the other hand, Whitelisting software, sometimes referred to as application whitelisting or application control, only allows items that are explicitly allowed by the system administrators that configured the software. Both antivirus and whitelisting have their advantages and disadvantages. Each type of application offers protections that are complementary to the other, and using both can be a good defense-in-depth approach to securing a system.
In the first part of this article, we discussed Electro Magnetic Compatibility (EMC) and the benefits of pre-compliance testing. In this installment, we will explore the equipment and procedures used to perform the tests, and the rationale used to evaluate the test results.
Have you ever wondered what all of those marks on the bottom of your keyboard or power strip mean, or why they are even there? FoxGuard Solutions presents a new blog series, “Regulatory Compliance 101,” as an introduction to the purpose of these marks and the testing and certification behind them. In this first installment of our series, we’ll be taking a closer look at compliance with the FCC.
The Federal Communication Commission (FCC) and the Conformité Européenne (CE) are the two major conformity standards for products sold in the United States and the European Union respectively. To insure compliance with these specifications, EMC testing must be conducted by certified laboratories that possess the facilities and equipment as proscribed by the applicable standards.
To understand the current state of cyber vulnerabilities, it's helpful to have a good working knowledge of the development of computer infrastructure. Not sure where to start? Read our article on the history of critical infrastructure vulnerability from 1960-1989.
Microsoft recently announced the next generation of their operating system – Windows 10. Windows 10 is not just a new interface. It has an enterprise and business focus. More of what businesses need has been integrated into the OS such as enterprise-grade security, identity and information protection features, simplified management and deployment, and continued improvements based on customer feedback. Windows 10 will...
Identifying and documenting ports and associated services, to meet NERC CIP documentation requirements for an audit, can be a complicated and sometimes lengthy undertaking. How do you determine which ports and services you need to document for your NERC CIP requirements? Read Part 1 of our Ports & Services White Paper for some guidance.