-
Is continuoulsly maintaining PCI compliance possible?
Charles Denyer addresses the ongoing struggle enterprises face in maintaining PCI compliance, weighing practicality with security necessity.
-
Firewall network security: Thwarting advanced attacks
Firewall network security is still a critical part of securing an enterprise. Learn what sophisticated attacks a firewall can effectively prevent.
-
Enterprise website encryption best practices
Network security expert Mike Chapple details the fundamentals of Web server encryption and Web encryption deployment best practices.
-
Encrypt text messages to protect against mobile Trojans
SMS-stealing Trojans can be thwarted by encrypting text messages on smartphones.
-
How to bolster BIOS security to prevent BIOS attacks
BIOS attacks can be thwarted by implementing NIST guidelines for BIOS security.
-
Securing IE with plug-ins Google Chrome Frame and IETab
Web browser plug-ins can bolster IE security for legacy apps that have to run on outdated versions of Internet Explorer.
-
Assessing Google Chrome extension flaws and security
Learn how flaws in the Google Chrome extensions affect the Chromebook security and the role they play in a risk assessment.
-
MySQL.com hack: How to stop website redirects
Learn how to stop website redirects put in place by malicious hackers, and how to prevent attacks like the MySQL.com hack.
-
Detect covert channels and prevent data exfiltration
A covert channel is just one more way data can leave the network. Learn how to detect and block covert channels from threats expert Nick Lewis.
-
NoScript addon: Addition to your antimalware toolkit
Browser plug-ins like the NoScript add-on can help prevent malware infections when configured correctly. Expert Nick Lewis explains.
-
Google malware warning system minimizes infections
Eventually hackers will manipulate Google’s malware warning feature, but it may help prevent future infections.
-
What is ISO certified vs. ISO compliant?
Expert Charles Denyer explains the difference between an ISO 27002 certification report and an ISO 27002 compliant report.
-
Improving Web application security
It may seem counterintuitive, but you can safely use automated attack toolkits to improve your Web application security. Nick Lewis explains.
-
Windows automated file and registry monitoring tools
A file and registry monitoring tool like Process Monitor can help IT organizations identify suspicious behavior that may be related to a malware infection.
-
SSL connections; pros and cons of web page delivery
An SSL connection can help secure Web browsing, but can affect website performance. Michael Cobb explains the pros and cons of an SSL connection.
-
Securing applications with a network pen test
Network penetration testing can help protect applications by uncovering weaknesses that provide an alternate route to sensitive data.
-
OAuth 2.0: Pros and cons of using federation protoc
Learn the advantages and disadvantages of using Open Authorization for Web application authentication.
-
Web application fingerprinting; new way to stop hackers
Hackers use Web application fingerprinting to learn about their target. You can reduce the amount of information they uncover with these tips.
-
How to secure websites using the HSTS protocol
Learn how to use HTTP Strict Transport Security (HSTS) to secure websites and how HSTS prevents man-in-the-middle attacks.
-
The security implications of high DHCP churn
Learn about the potential problems with high DHCP churn and whether it should be a concern to your organization.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO