-
VPN use in China: Protecting sensitive business data
With VPN use in China prohibited, businesses have reason to be concerned about the privacy of their data.
-
I smell a RAT: Remote access Trojan detection tools
Expert Brad Casey suggests tools that can detect remote access Trojans, or RATs, like FAKEM.
-
Secure the back door on Barracuda security devices
Learn how to lock down a back-door vulnerability on Barracuda security devices and prevent attackers from accessing management accounts.
-
Mitigate wireless denial-of-service vulnerabilities
Cisco WLAN controllers have faced several denial-of-service flaws. Learn how to reduce network security risk in cases when patches aren't available.
-
How to keep Google from indexing your network printers
In wake of an HP printer discovery issue where Google indexed thousands of printers, learn best practices to keep network printers off the Internet.
-
Open source Java frameworks: How big is the risk?
Expert Michael Cobb says security issues with open source Java applications have more to do with misconfigurations than the frameworks themselves.
-
How to reduce the risk of Flash security issues
A rash of zero-day exploits has one organization looking for ways to reduce the risk posed by Flash running on endpoints.
-
Is Firefox PDF reader a secure alternative to Adobe Rea
Expert Michael Cobb examines Mozilla’s Firefox PDF reader and discusses whether it is more secure than Adobe Reader.
-
What is OCSP?
Expert Michael Cobb explains the CASC's Online Certificate Status Protocol (OCSP) and OCSP stapling.
-
The risks of running Android apps on BlackBerry 10
Expert Michael Cobb explains the implications of running Android apps on BB10 and the system's new security features, including Balance.
-
Positioning the ROI of information security
According to expert Joe Granneman, return on security investment is a misnomer. Here's a better way to view security expenditures.
-
Selling the CIO on secure software development
Selling the CIO and others on secure application development requires understanding how it will impact the development process.
-
IT security risk training for executives
Executives don’t have time for formalized security risk training, so the onus is on the security team to become involved with core business processes.
-
Making the most of SANS security awareness tools
Learn how to use tools from the SANS Securing the Human program to boost the effectiveness of an enterprise security awareness program.
-
How to manage Samsung Android kernel issues for BYOD
Expert Nick Lewis discusses the threat and significance of Android kernel vulnerabilities found in popular Samsung mobile devices.
-
How to manage Google Chrome clickjacking flaw
Expert Nick Lewis explains the Google Chrome clickjacking vulnerability, including why avoiding the issue isn't as simple as switching browsers.
-
How malware evasion techniques affect anti-malware
Learn about the evolving nature of malware evasion techniques. Security expert Nick Lewis determines whether anti-malware tools should detect them.
-
How much risk does the WordPress pingback flaw pose?
Security expert Nick Lewis details the WordPress pingback vulnerability and advises whether it is time to update custom WordPress implementations.
-
What lessons can be learned from Project Blitzkrieg?
Expert Nick Lewis offers security measures that enterprises, particularly financials, can utilize to fend off Project Blitzkrieg-style DDoS attacks.
-
Getting funds for your information security budget
Getting executive support to boost the information security budget is no easy task. Expert Joe Granneman offers tips for getting the funds you need.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO