-
What does the Stuxnet worm mean for SCADA systems security?
SCADA systems have been highlighted in recent months for their insecurities, perhaps most notably with the release of the Stuxnet worm targeting them directly. But is the Stuxnet worm unique, or si...
-
Creating a third-party security policy to prevent a software exploit
Third-party software vulnerabilities are one of the most likely attack vectors in the information security landscape today. In this expert response, Nick Lewis discusses how to prevent these vulner...
-
Prevent a privilege escalation attack with database security policy
Privilege escalation attacks are dangerous wherever they occur, but can be particularly harmful if run in a database. Learn more from threats expert Nick Lewis.
-
Seeking an ethical hacking career: How to learn ethical hacking
In this expert response, Nick Lewis explains what an ethical hacker is and what skills such a hacker needs to be successful and compliant with the law.
-
Managing remote workers: Musts for setting up a secure home network
Is it the enterprise's responsibility to ensure that remote workers' home networks are secure? And, if so, how should they do it? Get expert advice from Nick Lewis.
-
Windows Server 2008 migration: Is it essential?
While many experts say the Windows Server 2008 operating system is Microsoft's most secure OS yet, expert Michael Cobb explains why a migration may not be essential for all companies.
-
How to use Wget commands and PHP cURL options for URL retrieval
When TCP or HTTP connections aren't behaving as expected, free tools like Wget and cURL can help with URL retrieval. Learn more in this expert response from Anand Sastry.
-
Can regional banking Trojans hide from signature-based antivirus?
Signature-based antivirus is useful for detecting many different kinds of malware, but has a notoriously difficult time tracking regional malware. In this expert response, Nick Lewis explains how r...
-
AT&T email address security breach: Can hackers track a SIM card?
Recently, a security breach at AT&T exposed the email addresses of thousands of its customers, but that may not be the biggest threat. In this expert response, Nick Lewis explains what could be the...
-
Does Internet protocol version 6 (IPv6) make applications more secure?
Will an enterprise transitioning to IPv6 automatically make applications more secure? In this expert response, learn what an IPv6 implementation can and cannot do for application security.
-
Security for Windows XP: Knowing when to update a Windows version
Is Windows XP still secure enough for enterprise use, or should infosec pros be updating to more secure Windows versions as soon as possible? Threats expert Nick Lewis weighs in.
-
Windows Active Directory security configuration
How secure is your configuration of Active Directory? Learn how to perform a security configuration assessment on such a directory in this expert response .
-
UTM appliances: How to choose among UTM vendors
Choosing a UTM appliance is a big job, as testing can take months and the costs aren't negligible. In this expert response, get advice on how many UTM devices to test, and what to consider during t...
-
HTTP vs. HTTPS: Is digital SSL certificate cost hurting Web security?
Learn why a digital SSL certificate could be the reason preventing many users from utilizing HTTPS.
-
How to keep messages secure with an email digital certificate
Using an email digital certificate can help protect important information from being read by anyone except the intended recipient.
-
After Facebook attack, has the threat of clickjacking attacks increased?
Learn more about the recent Facebook attack, and how clickjacking attacks in general can affect enterprise information security in this expert response from Nick Lewis.
-
How DNA cryptography relates to company information
What is DNA cryptography, and would it be an effective method for us in enterprise information security? IAM expert Randall Gamby discusses how DNA cryptography works and how to use it.
-
How to stop a DoS attack against a key server
When a disgruntled former employee decides to wreak havoc on a network with a DoS attack, there are a few quick steps you can take to minimize the damage. Learn more in this expert response.
-
Is there antivirus software that detects malware files via database files?
Is malware that contains database files easier to detect than other types of malware? Threats expert Nick Lewis explains.
-
Utilizing a hash function algorithm to help secure data
Learn how a hash function algorithm -- specifically a one-way hash function of the Dynamic SHA-2 algorithm -- can help protect important documents using a variety of hashes to confuse malicious code.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO