• Login
  • Become a member
  • RSS
  • Part of the TechTarget network
SearchSecurity.com
  • News
    • Latest Headlines
      • Lavabit, Silent Circle close secure email rather than spill the goods
      • Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
      • FortiGuard Labs sees fast rise of mobile malware in 2013
      • View All News
    • Featured
      • Information Security Magazine

        The information security pro’s resource for keeping corporate data, applications and devices secure

        Download Now!
  • Premium
    Editorial
    • E-Books
      • Technical guide to secure collaboration software
      • Technical guide on PCI: Global compliance trends
      • Technical guide to Web security gateways
      • View All E-Books
    • E-Zines
      • Information Security magazine
      • Information Security magazine archives
      • Information Security magazine subscription/renewal
      • Information Security magazine calendar
      • View All E-Zines
    • E-Handbooks
      • Emerging threat detection techniques and products
      • Enterprise network security visibility: Beyond traditional defenses
      • Network security best practices and essentials
      • View All E-Handbooks
  • Multimedia
      • Videos
      • Gary McGraw Silver Bullet Podcast
      • Screencasts
      • Webcasts
      • Podcasts
      • Slideshows
  • Security
    Topics
    • Topics
      • Enterprise Data Protection
      • Application and Platform Security
      • Enterprise Identity and Access Management
      • Government IT Security Management
      • Information Security Threats
      • Information Security Careers, Training and Certifications
      • Security Audit, Compliance and Standards
      • Security for the Channel
      • Enterprise Network Security
      • Information Security Management
    • Hot Topics
      • Security Management Strategies for the CIO
      • Security patch management and Windows Patch Tuesday news
      • PCI Data Security Standard
      • Disk Encryption and File Encryption
  • Tutorials
    • Advice & Tutorials
      • Security School Course Catalog from SearchSecurity.com
      • Information Security Learning Guides
      • Information security book excerpts and reviews
      • Wireless Security Lunchtime Learning with Lisa Phifer
      • Information security podcasts
      • Screencasts: On-screen demonstrations of security tools
      • View All Tutorials
    • Technology Dictionary
      • Find definitions and links to technical resources
      • Powered by WhatIs.com
  • Expert
    Advice
    • Tips
      • Corporate compliance program: How to give a status update to the board
      • Advanced threat-detection products emerge: Benefits and challenges
      • Deploying network security devices: Tips to avoid failed deployments
      • View All Tips
    • Answers
      • Enterprise app store encryption: Lessons to learn from Apple
      • Identifying and locking down known Java security vulnerabilities
      • SANS Top 20 Critical Security Controls vs. Defence Signals Directorate
      • View All Answers
    • Ask a Question
      • Get help from our technical community
      • Powered By ITKnowledgeExchange.com
  • White
    Papers
    • Research Library
      • White Papers
      • Business Webcasts
      • Downloads
      • Powered by Bitpipe.com
    • Product Demos
      • Try out software demos
      • Powered By 2020Software.com
    • Resource Centers
      • View All Resource Centers
  • Blogs
    • Blogs
      • More Security Blogs
      • Security Corner with Ken Harthun
      • Security Wire Weekly
      • More Security Blogs
      • Powered By ITKnowledgeExchange.com
  • Certification
    Central
      • CISSP Practice Test
      • Earn CPE Credit
  • Home
  • Ask the Experts
  • Submit your questions about infosec threats

    Nick Lewis is standing by to give you free, unbiased advice on information security threats.

  • Submit your questions about IAM

    Randall Gamby is standing by to give you free, unbiased advice on identity and access management.

  • Submit your questions about application security

    Michael Cobb is standing by to give you free, unbiased advice on application security.

  • Meet All Experts

Submit a question to our experts

Expert Answers

  • Is there antivirus software that detects malware files via database files?

    Is malware that contains database files easier to detect than other types of malware? Threats expert Nick Lewis explains.

  • Utilizing a hash function algorithm to help secure data

    Learn how a hash function algorithm -- specifically a one-way hash function of the Dynamic SHA-2 algorithm -- can help protect important documents using a variety of hashes to confuse malicious code.

  • How to stop a DoS attack against a key server

    When a disgruntled former employee decides to wreak havoc on a network with a DoS attack, there are a few quick steps you can take to minimize the damage. Learn more in this expert response.

  • Cisco network appliance security: Does 'self-defending' network stack up?

    Cisco has for years touted its concept of a "self-defending" network, but what does it actually entail? In this expert response, Anand Sastry explains what "self-defending" means (at least, accordi...

  • Can DHCP management tools be used to manage user account permissions?

    Learn more about whether using DHCP management tools is an effective way to manage user account permissions, and what other options might be, in this expert response from Randall Gamby.

  • Why it's important to turn on DEP and ASLR Windows security features

    In the quest for application security, many developers are disabling or incorrectly implementing two important Windows security features. In this expert response, Michael Cobb explains why ASLR and...

  • What to include in a remote access audit

    When conducting a remote access audit, there are specific questions you should be sure to ask to make sure everything is secure. In this expert response, Randall Gamby describes what to look for.

  • Will biometric authentication devices integrate with in-house software?

    Biometric devices may provide an added level of security, but how much effort is required to integrate them with existing software and systems, particularly those systems custom made for an organiz...

  • How to set up Apache Web server access control

    If you're hoping to allow or deny Apache Web server access based on IP address, check out this expert response from Randall Gamby.

  • How to block port scan attempts on a public wireless network

    Network security expert Anand Sastry explains how to block port scan attempts on a public wireless network at the host level.

  • Secure OpenVPN config with PAM

    Network security expert Anand Sastry explains the relationship between OpenVPN and TLS, and points out where to learn about using OpenVPN and PAM.

  • OpenLDAP migration: OpenLDAP from an Active Directory schema

    While integrating user provisioning products may seem like a lot of work, there are strategies to make it go smoothly. In this expert response, Randall Gamby describes how to incorporate OpenLDAP i...

  • The pros and cons of automated user provisioning software

    Automated user provisioning software can offer many benefits to enterprises, but its high cost and labor-intensive implementation may mean it's not right for yours. IAM expert Randall Gamby address...

  • Secure DMZ Web server setup advice

    Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS).

  • Identity management SSO security: Hardening single sign-on systems

    Get information on how to harden single sign-on systems for greater security in this response from IAM expert Randall Gamby.

  • Biometric security technology: The safest types

    Expert Randall Gamby explains which biometrics devices are most secure, and which could work best in your enterprise.

  • Hacking detection: Using a Windows server comparison to find a hack

    Find out what tools are the most useful for hacking detection, and if there is a way to conduct a Windows server comparison to find a hack.

  • Defending against SEO attacks in the enterprise

    Learn about the different types of SEO attacks, and how you can go about stopping them in your enterprise organization.

  • Static source code analysis tools: Pros and cons

    Static source code analysis tools can greatly improve application security, but it takes knowledge and expertise to use them correctly. Expert Michael Cobb explains why.

  • Creating a security risk management plan format

    Enterprises without a codified risk management plan are much more susceptible to threats. In this expert response from Ernie Hayden, learn how to create a risk management plan that covers all the b...

  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
More from Related TechTarget Sites
  • Cloud Security
  • Consumerization
  • Financial Security
  • SMB Security
  • Security AU
  • Security IN
  • Computer Weekly
  • Cloud Security
    • Storing data in the cloud: Addressing data location security issues

      When storing data in the cloud, ignoring the physical location of cloud data is a major mistake. Learn how to prevent data location security issues.

    • An introduction to enterprise hybrid cloud security

      A custom cloud infrastructure requires a special set of security controls. Get advice on how to implement hybrid cloud security the right way.

    • SOC 2 reports: The de facto cloud provider security standard

      They're not perfect, but SOC 2 reports are becoming the baseline for cloud provider security assessments. Expert Dave Shackleford discusses.

  • Consumerization
    • Network connectivity, security issues hinder mobile strategies

      Enterprises are limited in implementing mobile strategies due to security issues, network connectivity and compatibility.

    • Upcoming iOS 7 mobile management features affect MDM tools

      New mobile management capabilities coming in Apple iOS 7 have some enterprise mobility management vendors, including VMware changing their approach.

    • What do you know about dual-persona technology?

      Dual persona is fairly new, so you may not be familiar with it yet. Take our quiz to see how much you know -- and learn more -- about the technology.

  • searchFinancialSecurity
    • PayPal CISO: Laws must foster better cybersecurity information sharing

      PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.

    • Cybergang plans to use Trojan against U.S. banks

      A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.

    • Improved Shylock Trojan targets banking users

      The latest variant of the banking Trojan is causing numerous problems, Symantec said.

  • searchMidmarketSecurity
    • Windows Phone 7 security: Assessing WP7 security features

      Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.

    • Choosing the best security certifications for your career

      Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.

    • Midmarket security tutorials

      SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.

  • searchSecurityAU
    • Black Hat 2013: Experts urge elliptical curve cryptography adoption

      A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.

    • New advanced persistent threat protection: Beyond perimeter defense

      Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection.

    • Cisco spends cool $2.7 billion in Sourcefire acquisition

      In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.

  • Information Security
    • Indian banks step up security amid mobile banking acceleration

      The Indian banking system is at the begining of a new era, driven by mobile technology, but the widening of access to banking services brings with it security risks

    • Web app attacks demand automated defences, study finds

      Automation is the most effective way to tackle multiple prolonged cyber attacks on web applications, a study has confirmed

    • BlackBerry ready to enable India to track messages

      BlackBerry is ready to provide Indian law enforcement authorities with a way to track emails, email attachments and chats sent over its services

  • Computer Weekly
    • NHS Central Midlands CSU updates datacentre with standardised data warehousing

      It improved the quality and safety levels of healthcare for over 5 million citizens across the West Midlands by standardising data warehousing

    • BlackBerry looks for a buyer to focus on BES and BB10

      The board of directors at BlackBerry are considering the sale of the troubled smartphone company, in a bid to focus on BlackBerry 10

    • ICO to investigate London bins that track smartphones

      Information Commissioner's Office is making enquiries into bins in London that track passing smartphones to target advertising to owners

All Rights Reserved,Copyright 2000 - 2013, TechTarget
  • About Us
  • Contact Us
  • Site Index
  • Privacy policy
  • Advertisers
  • Business partners
  • Events
  • Media kit
  • TechTarget Corporate site
  • Reprints
  • Archive
  • Site map