Ask the Expert - 'Herd intelligence' provides a distributed sensor net, finding new specimens that are potentially evil. Information security threat expert Ed Skoudis explains how effective the antimalware technology really is. 11 February 2008
Ask the Expert - Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains. 11 February 2008
Ask the Expert - Improper input validation leads to numerous kinds of attacks, including cross-site scripting, SQL injection and command injection. In this expert Q&A, Michael Cobb reviews the most important application development practices. 11 February 2008
Ask the Expert - Cookies hold data, such as user preferences and session tracking credentials. In this expert Q&A, Ed Skoudis explains how application developers can define and manage the cookies appropriately. 11 February 2008
Ask the Expert - The vast majority of phishing emails still include HTTP links, but there has been a recent smattering that refer to FTP sites. In this SearchSecurity.com Q&A, Ed Skoudis explains how to be ready for the malicious messages. 04 January 2008
Ask the Expert - Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Ed Skoudis explains why this function isn't as innocent as it seems. 04 January 2008
Ask the Expert - Critical security flaws are often discovered in Java Runtime Environment implementations. Unfortunately, most users don't apply any appropriate patches. Ed Skoudis reveals the security risks posed by a vulnerable JRE. 04 January 2008
11 - 20 of 91 in Expert Archive: Information Security Threats
Mobile enterprise application platforms continue to improve, but mobile application development platforms offer businesses more flexibility. The rapidly changing market can make it hard to stay current.
Which mobile OS is best for your enterprise? IT pro Michael Thomason took a deep dive this week with the three leaders -- Android, iOS and Windows Phone -- and found pros and cons for all, which in the end means customers have real choices.
Enterprise mobility expert Brian Katz offers advice to help businesses choose the right vendor to meet their needs. Feature breadth, deployment model and support for new operating systems should all factor into the decision.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.
This report was compiled by 4 former senior NSA employees:
- William Binney, former Technical Director, World Geopolitical & Military Analysis; Co-founder of the SIGINT Automation Research Center
- Thomas Drake, former Defense Intelligence Senior Executive Service, NSA
- Edward Loomis, former Chief, SIGINT Automation Research Center, NSA
- J. Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA