-
Exploring the most secure remote access methods
Virtual private networks are a common means of providing remote access, but expert Mike Chapple addresses whether it is the most secure option available.
-
Detecting mobile devices on a wireless guest network
The approach to detecting mobile devices on wireless guest networks is not the same as managing mobile devices on corporate networks. Our expert explains.
-
How to choose application security tools
Learn about application whitelisting, application firewalls and activity monitoring, and how to choose the right application security tools and products.
-
Software testing methodologies: Dynamic versus static
Learn about two software security testing methodologies – dynamic and static testing – in this expert response by Michael Cobb.
-
Which is the most secure Web browser?
Those organizations that haven’t upgraded to IE9 may consider Firefox a viable option. But is it a more secure Web browser? Michael Cobb has the answer.
-
Firefox 4 vs. Firefox 5: Risks of delaying an upgrade
Given the rapid release of new versions of Firefox, is it worth upgrading to Firefox 5 or should you wait? Expert Michael Cobb offers guidance.
-
Investing in your secure software development lifecycle
Implementing Windows ASLR can be a worthwhile investment in your enterprise’s secure software development lifecycle.
-
Open source testing tools for Web applications
Google’s open source testing tools for Web applications can save organizations money and improve the security of Web apps.
-
What is a virtual directory?
What is a virtual directory? As expert Michael Cobb explains, it can be an extremely helpful secure application deployment tool.
-
Managing toolbars and other browser extensions
Third-party browser extensions like toolbars can jeopardize client security. Expert Michael Cobb discusses what can be done to manage these risks.
-
JVM architecture: Applet to applet communication
In a Java Virtual Machine architecture, is it possible for two machines to communicate with one another? Expert Michael Cobb describes how the applet-to-applet communication process works.
-
Managing app permissions through isolated storage
Application permissions are essential in securing application data. Learn how isolated storage allows secure, controlled access to application files.
-
Next-generation firewalls: Marketing hype or real value
Next-gen firewalls have some features that can be of value to large enterprises, particularly visualization and improved levels of granular control.
-
Comparing relational database and NoSQL security
In this introduction to database security, expert Michael Cobb explains the differences between relational database and NoSQL security.
-
Scareware removal: How to get rid of fake AV malware
Threats expert Nick Lewis explains how to prevent and remove scareware infections.
-
Can hacker websites help companies anticipate attacks?
Tracking hacker chatter could be useful for discovering attacks, but there may be other, less risky routes to finding the same information.
-
Browser plug-ins for search engine poisoning protection
Learn about browser plug-ins that can help protect end users from malware delivered via search engine poisoning.
-
JeOs and the benefits of a virtual security appliance
A virtual security appliance offers enterprises a number of benefits, including an optimized operating system that simplifies patch management.
-
DO OS X endpoints need special AV software?
Macs should be protected against malware and unauthorized access just like their Windows counterparts. Learn how in this expert response.
-
Hardening Web application authorization
Insufficient authorization errors can lead to Web app compromises and data loss. Learn how to fix these authorization errors.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO