-
Software testing methodologies: Dynamic versus static
Learn about two software security testing methodologies – dynamic and static testing – in this expert response by Michael Cobb.
-
Which is the most secure Web browser?
Those organizations that haven’t upgraded to IE9 may consider Firefox a viable option. But is it a more secure Web browser? Michael Cobb has the answer.
-
Firefox 4 vs. Firefox 5: Risks of delaying an upgrade
Given the rapid release of new versions of Firefox, is it worth upgrading to Firefox 5 or should you wait? Expert Michael Cobb offers guidance.
-
Investing in your secure software development lifecycle
Implementing Windows ASLR can be a worthwhile investment in your enterprise’s secure software development lifecycle.
-
Open source testing tools for Web applications
Google’s open source testing tools for Web applications can save organizations money and improve the security of Web apps.
-
What is a virtual directory?
What is a virtual directory? As expert Michael Cobb explains, it can be an extremely helpful secure application deployment tool.
-
Managing toolbars and other browser extensions
Third-party browser extensions like toolbars can jeopardize client security. Expert Michael Cobb discusses what can be done to manage these risks.
-
JVM architecture: Applet to applet communication
In a Java Virtual Machine architecture, is it possible for two machines to communicate with one another? Expert Michael Cobb describes how the applet-to-applet communication process works.
-
Managing app permissions through isolated storage
Application permissions are essential in securing application data. Learn how isolated storage allows secure, controlled access to application files.
-
Next-generation firewalls: Marketing hype or real value
Next-gen firewalls have some features that can be of value to large enterprises, particularly visualization and improved levels of granular control.
-
Comparing relational database and NoSQL security
In this introduction to database security, expert Michael Cobb explains the differences between relational database and NoSQL security.
-
Scareware removal: How to get rid of fake AV malware
Threats expert Nick Lewis explains how to prevent and remove scareware infections.
-
Can hacker websites help companies anticipate attacks?
Tracking hacker chatter could be useful for discovering attacks, but there may be other, less risky routes to finding the same information.
-
Browser plug-ins for search engine poisoning protection
Learn about browser plug-ins that can help protect end users from malware delivered via search engine poisoning.
-
JeOs and the benefits of a virtual security appliance
A virtual security appliance offers enterprises a number of benefits, including an optimized operating system that simplifies patch management.
-
DO OS X endpoints need special AV software?
Macs should be protected against malware and unauthorized access just like their Windows counterparts. Learn how in this expert response.
-
Hardening Web application authorization
Insufficient authorization errors can lead to Web app compromises and data loss. Learn how to fix these authorization errors.
-
How to erase browser history
Attackers often try to access enterprise users’ browsing history. Expert Michael Cobb explains how to erase browser history proactively.
-
Fight against phishing with SPF and DKIM authentication
The fight against phishing has been waging for years. Expert Michael Cobb explains how SPF and DKIM authentication technologies could turn the tide.
-
How to prevent drive-by download malware
There are several security strategies enterprises can implement to prevent drive-by download malware infections. Get tips in this expert response.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO