-
How enterprises should react to OWASP's updated Top 10
Expert Michael Cobb highlights the changes made in the 2013 OWASP Top 10 list, including new vulnerabilities and what they mean for enterprises.
-
CAMP for Chrome: Has Google improved Chrome security?
Expert Michael Cobb explains how Content-Agnostic Malware Protection, or CAMP for Chrome, works and whether the feature improves Chrome security.
-
Should enterprises deploy 2FA despite vulnerabilities?
Two-factor authentication vulnerabilities are a real concern, but should they deter enterprises from deploying 2FA? Expert Michael Cobb discusses.
-
Weighing the security risk of unqualified domain names
An unqualified domain name can make reaching internal resources easier, but expert Michael Cobb warns that man-in-the-middle attacks could result.
-
Has the RC4 encryption algorithm been broken for good?
Expert Michael Cobb provides background on the RC4 encryption algorithm and determines whether a recent RC4 attack signals trouble for SSL/TLS users.
-
How to keep data-classification levels simple
The best data-classification programs are simple and easy to use. Expert Mike Chapple outlines his four must-have data-classification categories.
-
Complying with the new HIPAA Omnibus Rule
The 2013 HIPAA Omnibus Rule requires changes to HIPAA business associate agreements. Expert Mike Chapple explains how to comply.
-
PCI DSS prioritized approach to compliance
You can take a phased approach to achieving PCI DSS compliance, but expert Mike Chapple says you aren't compliant until you meet all its requirements.
-
Decoding the mysteries of steganography
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data.
-
Talking to execs: How to make a good first impression
Explaining an information security program to C-suite executives can be nerve-racking. Here's how to make a good first impression.
-
Best practices for choosing security software products
Expert Joe Granneman weighs in on the value of market revenue rankings when it comes to choosing security software.
-
The best way to study for the CISSP certification exam
Expert Joe Granneman offers insights on different ways to prepare for the CISSP exam, and outlines what he thinks is the best way to study.
-
How to defend against an AET attack
Expert Brad Casey explains advanced evasion techniques and details how to protect enterprise networks against the likelihood of an AET attack.
-
Do high-speed networks increase network security risk?
Expert Brad Casey explains the relationship between network speed and the ability to monitor network activity in the enterprise.
-
Applying the Lockheed Martin cyber kill chain
Expert Brad Casey analyzes the value of the Lockheed Martin cyber kill chain strategy, emphasizing data exfiltration over intrusion prevention.
-
Juniper Junos flaw proves need to update network gear
Expert Brad Casey says the recent Junos OS flaws demonstrates why enterprises must diligently update networking router software to stay secure.
-
Does OpenFlow enable SDN security?
Expert Brad Casey answers a question on OpenFlow security implications: Can the OpenFlow protocol foster software-defined networking (SDN) security?
-
App store encryption: Learning from Apple's mistakes
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements.
-
Out of control: Tackling Java endpoint vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.
-
Weighing security controls: SANS vs. Australian DSD
Expert Michael Cobb compares the value of the SANS Top 20 Critical Security Controls with Australia's Defence Signals Directorate advice.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO