-
Proxy server security: Defending against DoS and other attacks
In this expert response, find out how to boost proxy server security in the enterprise.
-
Google Wave security development: Is the app ready for enterprises?
While Internet apps may be the future of collaboration, Google Wave hasn't quite reached shore when it comes to enterprise-level security. In this expert response, Michael Cobb details the pros and...
-
The cost of an audit: Choosing a competent PCI DSS QSA
Choosing the least expensive PCI DSS QSA for your PCI audit might seem like common sense, but not all auditors know what they're doing. In this expert response, Ernie Hayden describes what to look ...
-
Is the 3DES encryption algorithm the best choice for S/MIME protocol?
The triple DES encryption algorithm was originally designed for the S/MIME protocol, but is it still the best choice for encryption? In this expert response, Randall Gamby describes the advantages ...
-
Negotiating an IT security budget for a data loss prevention tool
If your enterprise is considering a DLP purchase, read this expert response for advice on getting the information security budget to buy the best product possible.
-
Creating a user account management policy to delete old accounts
If you're not deleting orphaned accounts, you may be leaving the door wide open to attackers. In this expert response from Randall Gamby, learn how to create an effective user account management po...
-
How to enforce a USB security policy with support from management
A USB security policy is only as good as its enforcement. In this expert response from Ernie Hayden, learn how to make sure your employees take USB security policies seriously.
-
Is an SMTP TLS certificate the same as an FTP SSL certificate?
Are all security transportation-level certificates (TLSes) the same, or are there different certificates for different protocols? In this expert response, Randall Gamby discusses SMTP and FTP certi...
-
Is a touchscreen virtual keyboard good for keeping passwords secure?
Recently, touchscreen virtual keyboards have been showing up on sites as an added security measure. What are the pros and cons of these virtual keyboards, and are they capable of stopping keylogging?
-
The difference between a digital signature and digital certificate
A digital signature and a digital certificate, while both security measures, are different in the ways they are implemented and what they are implemented for. In this expert response, Randall Gamby...
-
Credit card data storage: Virtual terminal protocol for PCI compliance
Are merchants who use virtual terminals and payment gateways and do not store credit card data subject to PCI DSS requirements? Learn more in this expert response from Ernie Hayden.
-
Gap analysis methodology for IT security and compliance
If your enterprise is faced with multiple-standard compliance, having a set gap analysis methodology can save a lot of time and effort. Learn more in this expert response from Ernie Hayden.
-
Smartphone malware pre-installed: The next security threat
Pre-installed smartphone malware is a growing problem and security pros need to be aware of how this malware could creep into your organization.
-
Adobe Acrobat Reader security: Can patches be avoided?
Security expert Michael Cobb counters recent advice from Fiserv not to install Adobe Reader patches and says these updates are vital to security and must trump user functionality.
-
What are the differences between symmetric and asymmetric encryption algorithms?
In this expert response, Michael Cobb explains the differences between symmetric and asymmetric encryption algorithms and the pros and cons of each.
-
Separation of duties: Internal user account controls
If your user account administration is dispersed among different departments, you might be looking into centralizing it. This can work, provided you have a trustworthy administrator and separation ...
-
SANS Top 25 programming errors: Application security best practices
Learn the SANS Top 25 programming errors and the best practices for application security.
-
Is it safe to use third-party code when developing database applications?
Michael Cobb explains how you can safely use third-party code, such as DLLs, when developing database applications.
-
DBMS security: Data warehouse advantages
Are there data warehouse advantages in regard to security? Without question. Michael Cobb explains.
-
Information security program development: Security vs. compliance
Some enterprises can be compliant for their audits, but let security slip the rest of the time. In this expert response, Ernie Hayden explains how to get your enterprise to focus on security rather...
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO