-
Evolution of bank malware: Tatanarg and OddJob Trojans
Online banking credentials are one of the most lucrative bits of information available to steal. Expert Nick Lewis advises how to keep cutting-edge Trojans off company machines.
-
How to confirm the origin of a cyberattack
What's the best way to determine the origin of a cyberattack? Expert Nick Lewis weighs in.
-
How to protect intellectual property from hacker theft
More hackers are targeting corporate IP over SSNs and card data. Expert Nick Lewis explains how to protect intellectual property in the enterprise.
-
How to set up a site-to-site VPN to coexist with a DMZ
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response.
-
IPv6 malware: With the transition, will spam increase?
The transition from IPv4 to IPv6 could have some unintended negative consequences for security.
-
Can endpoint security systems prevent all Web attacks?
Is there one tool that combines all the functionalities needed to protect against Web-based attacks? Expert Nick Lewis weighs in.
-
Known vulnerabilities in IEEE 802.11 standard
IEEE 802.11 has several known vulnerabilities, so what's the best way for enterprises to handle them? Expert Anand Sastry explains.
-
How to protect against the Bredolab virus Trojan
Learn more about a recent Bredolab Trojan exploit involving online job applications, and how you can protect your organization from such threats.
-
Is host-based intrusion detection replacing signatures?
As signature-based IDS becomes less effective, is host-based IDS the best option to replace it? Expert Anand Sastry weighs in.
-
Using hop-by-hop encryption for email security
Learn how hop-by-hop encryption gives enterprises the opportunity to send encrypted emails to large amounts of employees without a digital signature for each email from expert Michael Cobb.
-
Using Microsoft MSAT to find and fix vulnerabilities
Expert Michael Cobb explains how Microsoft security assessment tools can find and help your enterprise fix vulnerabilities in its Windows environment.
-
Is a Microsoft Internet health check viable?
While it would be nice to check every computer for malware before allowing it on the Internet, expert Nick Lewis details why this is problematic.
-
OddJob Trojan: Different from other banking threats?
What particular risks does the OddJob Trojan pose to the security of financial transactions over the Web? Expert Nick Lewis explains.
-
URL shortening security best practices
Expert Michael Cobb weighs in on risks you may not know about with shortened URLs from TinyURL or Bit.ly.
-
Ensuring the security of financial transactions online
Financial transactions are some of the most high-risk activities performed online. Expert Nick Lewis gives advice to financial firms on how they can prevent online transaction fraud.
-
Is cloud-based antivirus better?
Cloud-based antivirus has pros and cons, but, on the whole, can it be more effective than regular antivirus products? Learn more from expert Nick Lewis.
-
Zero-day protection for MS Graphics Rendering Engine
How vulnerable is the Windows Graphics Rendering Engine, and how should companies address recent zero-day attacks? Learn more in this expert response.
-
MHTML security for Internet Explorer
Threats expert Nick Lewis discusses a recent vulnerability in MHTML security, and whether disabling the MHTML IE function is the best defense tactic.
-
Exploring behavioral monitoring for virtual platforms
Learn about virtual behavior-based monitoring tactics, which allow for easy anomaly detection and can help defend a virtualization infrastructure.
-
Pros & cons of Gmail Postini spam-filtering for SMBs
Learn how a Web-based free spam-filtering service can secure email and prevent spam from attacking your enterprise.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO