Ask The Security Expert: Questions & Answers
Expert Archive: Information Security Threats
Check out past Q&As with former SearchSecurity.com expert Ed Skoudis.

-
The telltale signs of a network attack
Ask the Expert - Some people believe that if IP addresses from China are attacking their network, then they are under attack from China. Expert John Strand explains why all that it is irrelevant. 01 April 2009 -
Will Google Chrome enhance overall browser security?
Ask the Expert - Expert John Strand reviews Google Chrome's browser security features and what the new tool will mean for enterprise IT teams. 28 January 2009 -
Are there antivirus suites that pick up more than just run-of-the-mill viruses?
Ask the Expert - There are some rare forms of malware that antivirus software doesn't pick up on, but there are some good tools to remove all sorts of malware. 02 June 2008 -
What tools can a hacker use to crack a laptop password?
Ask the Expert - Password cracking may be a hacker's specialty, but there are also many strategies to keep passwords secure. 15 May 2008 -
Are social networking sites an easy target for malicious hackers?
Ask the Expert - With the rise of social networking giants like MySpace and Facebook, it makes sense that there would also be a rise in malware to attack them. 11 April 2008 -
Should social engineering tests be included in penetration testing?
Ask the Expert - Information security threats expert Ed Skoudis weighs the positive and negative aspects of allowing social engineering tests to be a part of the penetration testing process. 02 April 2008 -
What kind of data is compromised during a Google hack?
Ask the Expert - Ed Skoudis defines Google hacking, unveils the type of data that is most commonly exposed during this type of attack and offers ways to ward off Google hackers. 02 April 2008 -
What are the dangers of cross-site request forgery attacks (CSRF)?
Ask the Expert - Ed Skoudis defines the threats posed by cross-site request forgery attacks (CSRF), and explains how they are similar and different from cross-site scripting attacks. 02 April 2008 -
Best practices for using restriction policy whitelists
Ask the Expert - Ed Skoudis discusses which systems should be considered for software restriction policy whitelists, and unveils how whitelisting can improve security. 02 April 2008 -
Defining mobile device security concerns
Ask the Expert - Ed Skoudis explains how to secure sensitive data on mobile devices, and unveils the most common mobile security threats, such as physical theft and remote exploitation. 01 April 2008
Security Management Strategies for the CIO