• Login
  • Become a member
  • RSS
  • Part of the TechTarget network
SearchSecurity.com
  • News
    • Latest Headlines
      • Lavabit, Silent Circle close secure email rather than spill the goods
      • Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
      • FortiGuard Labs sees fast rise of mobile malware in 2013
      • View All News
    • Featured
      • Information Security Magazine

        The information security pro’s resource for keeping corporate data, applications and devices secure

        Download Now!
  • Premium
    Editorial
    • E-Books
      • Technical guide to secure collaboration software
      • Technical guide on PCI: Global compliance trends
      • Technical guide to Web security gateways
      • View All E-Books
    • E-Zines
      • Information Security magazine
      • Information Security magazine archives
      • Information Security magazine subscription/renewal
      • Information Security magazine calendar
      • View All E-Zines
    • E-Handbooks
      • Emerging threat detection techniques and products
      • Enterprise network security visibility: Beyond traditional defenses
      • Network security best practices and essentials
      • View All E-Handbooks
  • Multimedia
      • Videos
      • Gary McGraw Silver Bullet Podcast
      • Screencasts
      • Webcasts
      • Podcasts
      • Slideshows
  • Security
    Topics
    • Topics
      • Enterprise Data Protection
      • Application and Platform Security
      • Enterprise Identity and Access Management
      • Government IT Security Management
      • Information Security Threats
      • Information Security Careers, Training and Certifications
      • Security Audit, Compliance and Standards
      • Security for the Channel
      • Enterprise Network Security
      • Information Security Management
    • Hot Topics
      • Security Management Strategies for the CIO
      • Security patch management and Windows Patch Tuesday news
      • PCI Data Security Standard
      • Disk Encryption and File Encryption
  • Tutorials
    • Advice & Tutorials
      • Security School Course Catalog from SearchSecurity.com
      • Information Security Learning Guides
      • Information security book excerpts and reviews
      • Wireless Security Lunchtime Learning with Lisa Phifer
      • Information security podcasts
      • Screencasts: On-screen demonstrations of security tools
      • View All Tutorials
    • Technology Dictionary
      • Find definitions and links to technical resources
      • Powered by WhatIs.com
  • Expert
    Advice
    • Tips
      • Corporate compliance program: How to give a status update to the board
      • Advanced threat-detection products emerge: Benefits and challenges
      • Deploying network security devices: Tips to avoid failed deployments
      • View All Tips
    • Answers
      • Enterprise app store encryption: Lessons to learn from Apple
      • Identifying and locking down known Java security vulnerabilities
      • SANS Top 20 Critical Security Controls vs. Defence Signals Directorate
      • View All Answers
    • Ask a Question
      • Get help from our technical community
      • Powered By ITKnowledgeExchange.com
  • White
    Papers
    • Research Library
      • White Papers
      • Business Webcasts
      • Downloads
      • Powered by Bitpipe.com
    • Product Demos
      • Try out software demos
      • Powered By 2020Software.com
    • Resource Centers
      • View All Resource Centers
  • Blogs
    • Blogs
      • More Security Blogs
      • Security Corner with Ken Harthun
      • Security Wire Weekly
      • More Security Blogs
      • Powered By ITKnowledgeExchange.com
  • Certification
    Central
      • CISSP Practice Test
      • Earn CPE Credit
  • Home
  • Ask the Experts
  • Submit your questions about infosec threats

    Nick Lewis is standing by to give you free, unbiased advice on information security threats.

  • Submit your questions about IAM

    Randall Gamby is standing by to give you free, unbiased advice on identity and access management.

  • Submit your questions about application security

    Michael Cobb is standing by to give you free, unbiased advice on application security.

  • Meet All Experts

Submit a question to our experts

Expert Answers

  • MHTML security for Internet Explorer

    Threats expert Nick Lewis discusses a recent vulnerability in MHTML security, and whether disabling the MHTML IE function is the best defense tactic.

  • Exploring behavioral monitoring for virtual platforms

    Learn about virtual behavior-based monitoring tactics, which allow for easy anomaly detection and can help defend a virtualization infrastructure.

  • Pros & cons of Gmail Postini spam-filtering for SMBs

    Learn how a Web-based free spam-filtering service can secure email and prevent spam from attacking your enterprise.

  • Advice on free Web application vulnerability scanners

    Expert Michael Cobb points to several free Web application vulnerability scanners to help prevent SQL injection or XSS exploits.

  • How an IIS Web application pool boosts app security

    Did you know an IIS Web application pool not only helps manage your applications, but also makes them more secure? Expert Michael Cobb explains the benefits of Web application pools.

  • Debug and test Web applications using Burp Proxy

    The Burp Proxy tool, part of the Burp Suite, has many useful features that test Web application security. Learn how to start using Burp Proxy.

  • What is SQL Server Atlanta?

    Have you heard about Microsoft’s cloud-based SQL Server Atlanta service? Expert Michael Cobb discusses how Atlanta can help improve performance and security.

  • Rating Windows 7 mobile device encryption

    Is it true that Windows 7 mobile device encryption isn’t on-board? How does that affect the phones’ security? Expert Michael Cobb looks at how mobile encryption is vital to enterprise security.

  • Which is best: Certification or an IT security degree?

    Which will be more likely to further your infosec career: A certification, or an advanced degree? Expert Ernie Hayden weighs in.

  • Getting started with a DNSSEC implementation

    The many well-publicized flaws in DNS make implementing DNSSEC even more vital. In this expert response, Mike Chapple explains the enterprise basics for a DNSSEC implementation.

  • Wireless key security: Securing wireless networking

    In this expert response, Mike Chapple presents guidelines for wireless key security, including choosing the most secure wireless key possible.

  • How to find a real IP address using proxy server logs

    While using proxy server logs to identify the real IP address of an attacker using a proxy server is technically easy, there are other difficulties along the way. Expert Mike Chapple explains.

  • Can rootkit detection mechanisms stop the Blue Pill?

    At Black Hat 2006, researcher Joanna Rutkowska unveiled a piece of machine-based malware called the Blue Pill. But is it a serious threat to your operating system? Ed Skoudis explains in this exper...

  • How to defend against pivot attacks in the enterprise

    Nick Lewis explains what a pivot attack is and tells how to go about defending your organization against this threat.

  • Can threat modeling tools help secure mobile apps?

    When developing enterprise applications, do you know the quickest way to bridge the gap between an information security team and a development group?

  • Diffie-Hellman vs. RSA: Comparing algorithms

    See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown from expert Michael Cobb.

  • Google 'Gchat' security and Internet application security best practices

    Users in the enterprise may unknowingly be exposed to 'Gchat' security risks. Expert Michael Cobb discusses Internet application security best practices that can help protect enterprise users.

  • Valuable third-party patch deployment software, tools

    Do you know some of the best third-party patch deployment tools? See expert Michael Cobb's recommendations on which tools would work best for your enterprise.

  • Secure cloud file storage for health care: How to regain control

    Should health care organizations endorse the use of secure cloud file storage? Michael Cobb offers advice on establishing governance processes for cloud-based services.

  • Social networking best practices for preventing social network malware

    Get advice on social networking security best practices that can help prevent data leaks and other social network malware that could harm to your enterprise.

  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
More from Related TechTarget Sites
  • Cloud Security
  • Consumerization
  • Financial Security
  • SMB Security
  • Security AU
  • Security IN
  • Computer Weekly
  • Cloud Security
    • Storing data in the cloud: Addressing data location security issues

      When storing data in the cloud, ignoring the physical location of cloud data is a major mistake. Learn how to prevent data location security issues.

    • An introduction to enterprise hybrid cloud security

      A custom cloud infrastructure requires a special set of security controls. Get advice on how to implement hybrid cloud security the right way.

    • SOC 2 reports: The de facto cloud provider security standard

      They're not perfect, but SOC 2 reports are becoming the baseline for cloud provider security assessments. Expert Dave Shackleford discusses.

  • Consumerization
    • Rich mobile platforms vs. mobile Web-based services

      One big debate right now is whether employees should use local applications or mobile Web-based services. There are use cases for each kind of app.

    • NAC security becoming critical infrastructure component for BYOD

      Organizations are warming up to NAC security products due to popularity of BYOD for robust device security and better systems integration.

    • Managing endpoints is about monitoring access, not device control

      Managing endpoints in the BYOD era isn't easy, and you have to come at it with the right attitude. Focus more on access and less on device control.

  • searchFinancialSecurity
    • PayPal CISO: Laws must foster better cybersecurity information sharing

      PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.

    • Cybergang plans to use Trojan against U.S. banks

      A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.

    • Improved Shylock Trojan targets banking users

      The latest variant of the banking Trojan is causing numerous problems, Symantec said.

  • searchMidmarketSecurity
    • Windows Phone 7 security: Assessing WP7 security features

      Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.

    • Choosing the best security certifications for your career

      Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.

    • A step-by-step SMB IT security risk assessment process

      Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.

  • searchSecurityAU
    • Black Hat 2013: Experts urge elliptical curve cryptography adoption

      A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.

    • New advanced persistent threat protection: Beyond perimeter defense

      Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection.

    • Cisco spends cool $2.7 billion in Sourcefire acquisition

      In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.

  • Information Security
    • Indian banks step up security amid mobile banking acceleration

      The Indian banking system is at the begining of a new era, driven by mobile technology, but the widening of access to banking services brings with it security risks

    • Web app attacks demand automated defences, study finds

      Automation is the most effective way to tackle multiple prolonged cyber attacks on web applications, a study has confirmed

    • BlackBerry ready to enable India to track messages

      BlackBerry is ready to provide Indian law enforcement authorities with a way to track emails, email attachments and chats sent over its services

  • Computer Weekly
    • Government to put 50% of all new IT spend through SMEs

      The government wants to put half of all new IT spending through small IT suppliers – doubling the previous target

    • CIO interview: Mike Timlett, CitySprint

      Mike Timlett's career as an IT director has tracked the rise of mobile technologies that empower new business processes

    • Cisco incubator to connect UK startup clusters

      Cisco is launching its National Virtual Incubator to harness innovation and incubation across the UK.

All Rights Reserved,Copyright 2000 - 2013, TechTarget
  • About Us
  • Contact Us
  • Site Index
  • Privacy policy
  • Advertisers
  • Business partners
  • Events
  • Media kit
  • TechTarget Corporate site
  • Reprints
  • Archive
  • Site map