-
OpenOffice security: Concerns when moving from Microsoft Office
What are the major OpenOffice security concerns when transitioning from Microsoft Office? Security expert Michael Cobb explains the potential vulnerabilities between open source and commercial soft...
-
How to decode a cipher: Identifying a cryptographic hash algorithm
While it is possible to identify a cryptographic algorithm by way of cipher bit sequences, it can be difficult, and is sometimes illegal. IAM expert Randall Gamby gives advice and a warning.
-
The benefits of application proxy firewalls
Michael Cobb explains the benefits of application proxy firewalls as compared to other firewall technologies including packet filtering firewalls and stateful inspection firewalls or circuit-level ...
-
Should national information security standards be enforceable?
In this expert response, Ernie Hayden discusses the feasibility of creating nation information security standards that applied to all U.S. organizations deemed to have sensitive data.
-
Password encryption program: Best practices and alternatives
If you want to create password encryption code, check out these best practices from IAM expert Randall Gamby. He also offers alternatives to encrypting, such as using Kerberos or Federation SAML.
-
How to update a disaster recovery, contingency planning strategy
Have your disaster recovery plans fallen woefully behind the current state of your business? In this expert response, Ernie Hayden discusses how to conduct tabletop exercises to get your plans back...
-
Is user account administration one of the duties of a DBA?
Is it security's job to administer user accounts, or is it the DBA's job? In this expert response, learn about how information security and DBAs should work together on user account administration.
-
Advanced Encryption Standard and AES ciphers: Can they be cracked?
No encryption standard is unbreakable, but Advanced Encryption Standard may come close. Michael Cobb discusses why AES ciphers are so tough to beat.
-
Digital signature implementation: How to verify email addresses
When implementing digital signatures in Outlook, learn what pitfalls to avoid and how to verify the email addresses and digital signatures of the senders.
-
HIPAA password policy: Managing Windows stored usernames and passwords
Under HIPAA, is it allowable to store Windows usernames and passwords? In this expert response, Ernie Hayden discusses managing access for companies that must be HIPAA compliant.
-
SOX data retention policies: What to do with old software archives
What do you do when sensitive data is stored on old versions of software? In this expert response, Ernie Hayden discusses how to make sure you retain data correctly for Sarbanes Oxley compliance pu...
-
Managing an IE6 upgrade for browser security without SUS or WSUS
Security expert Michael Cobb explains how to upgrade from IE6 for browser security without using SUS or WSUS.
-
Smart card security: Disable a lost smart card and track with GPS?
Is it possible to track a lost or stolen smart card with GPS? In this IAM expert response, Randall Gamby gives advice on enhancing smart card security in such a situation.
-
A written information security policy (WISP) example for compliance
Looking for a Written Information Security Policy (WISP) example for compliance with the Massachusetts data protection law? In this expert response, Ernie Hayden gives readers just that.
-
How secure is an email with a .pdf attachment?
Sending sensitive information in an email or as an attachment is unsafe, and depending on your organization's security policies, could land you in a lot of trouble. Michael Cobb explains why.
-
How to secure online collaboration applications like Google Wave
Love them or hate them, online collaboration applications and tools are here to stay. Michael Cobb explains how to secure next-generation communication like Google Wave.
-
Security must-haves after building a Web application
Michael Cobb reviews the security devices needed to protect a newly built Web application.
-
Will technologies like Vanish help create archived, unreadable data?
Self-destructing data is a nice thought, says Michael Cobb, but we're some ways off from achieving reliable document control of this kind.
-
Should VMware vulnerabilities in JRE impede implementing virtualization?
Could recent VMware vulnerabilities in JRE hamper virtualization implementation? In this expert response, Michael Cobb explains that VMware attacks are theoretical at this point and shouldn't stop ...
-
Risk prioritization: DLP for data loss or laptop full disk encryption?
With a limited IT security budget, it's often necessary to undergo risk prioritization and make difficult choices. In this expert response, Ernie Hayden discusses whether it's better to deploy a DL...
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO