-
Can DHCP management tools be used to manage user account permissions?
Learn more about whether using DHCP management tools is an effective way to manage user account permissions, and what other options might be, in this expert response from Randall Gamby.
-
Cisco network appliance security: Does 'self-defending' network stack up?
Cisco has for years touted its concept of a "self-defending" network, but what does it actually entail? In this expert response, Anand Sastry explains what "self-defending" means (at least, accordi...
-
Why it's important to turn on DEP and ASLR Windows security features
In the quest for application security, many developers are disabling or incorrectly implementing two important Windows security features. In this expert response, Michael Cobb explains why ASLR and...
-
What to include in a remote access audit
When conducting a remote access audit, there are specific questions you should be sure to ask to make sure everything is secure. In this expert response, Randall Gamby describes what to look for.
-
Will biometric authentication devices integrate with in-house software?
Biometric devices may provide an added level of security, but how much effort is required to integrate them with existing software and systems, particularly those systems custom made for an organiz...
-
How to set up Apache Web server access control
If you're hoping to allow or deny Apache Web server access based on IP address, check out this expert response from Randall Gamby.
-
How to block port scan attempts on a public wireless network
Network security expert Anand Sastry explains how to block port scan attempts on a public wireless network at the host level.
-
OpenLDAP migration: OpenLDAP from an Active Directory schema
While integrating user provisioning products may seem like a lot of work, there are strategies to make it go smoothly. In this expert response, Randall Gamby describes how to incorporate OpenLDAP i...
-
Secure OpenVPN config with PAM
Network security expert Anand Sastry explains the relationship between OpenVPN and TLS, and points out where to learn about using OpenVPN and PAM.
-
The pros and cons of automated user provisioning software
Automated user provisioning software can offer many benefits to enterprises, but its high cost and labor-intensive implementation may mean it's not right for yours. IAM expert Randall Gamby address...
-
Identity management SSO security: Hardening single sign-on systems
Get information on how to harden single sign-on systems for greater security in this response from IAM expert Randall Gamby.
-
Secure DMZ Web server setup advice
Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS).
-
Biometric security technology: The safest types
Expert Randall Gamby explains which biometrics devices are most secure, and which could work best in your enterprise.
-
Hacking detection: Using a Windows server comparison to find a hack
Find out what tools are the most useful for hacking detection, and if there is a way to conduct a Windows server comparison to find a hack.
-
Defending against SEO attacks in the enterprise
Learn about the different types of SEO attacks, and how you can go about stopping them in your enterprise organization.
-
Static source code analysis tools: Pros and cons
Static source code analysis tools can greatly improve application security, but it takes knowledge and expertise to use them correctly. Expert Michael Cobb explains why.
-
How will differential power analysis attacks compromise cryptographic keys?
Learn about differential power analysis attacks that target victims by measuring electromagnetic signals emitted by chips and then stealing cryptokeys from mobile devices.
-
What controls should be used to block social networking sites?
Find out what controls companies can use to block social networking sites.
-
Creating a security risk management plan format
Enterprises without a codified risk management plan are much more susceptible to threats. In this expert response from Ernie Hayden, learn how to create a risk management plan that covers all the b...
-
Which tools will help in validating form input in a website?
Find out how to validate form input in a website.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO