-
Security must-haves after building a Web application
Michael Cobb reviews the security devices needed to protect a newly built Web application.
-
Should VMware vulnerabilities in JRE impede implementing virtualization?
Could recent VMware vulnerabilities in JRE hamper virtualization implementation? In this expert response, Michael Cobb explains that VMware attacks are theoretical at this point and shouldn't stop ...
-
Risk prioritization: DLP for data loss or laptop full disk encryption?
With a limited IT security budget, it's often necessary to undergo risk prioritization and make difficult choices. In this expert response, Ernie Hayden discusses whether it's better to deploy a DL...
-
Account lockout policy: Addressing too many failed login attempts
Learn how to create account lockout policies that details how many failed login attempts should be allowed before a password lock out in order to prevent a password dictionary attack.
-
Can secure FTP services protect sensitive data from hackers?
Does secure FTP services protect against hackers and attacks? In this expert response, Michael Cobb explains why using a secure FTP service is vital for handling sensitive data transfers.
-
Best practices: Separation of duties for security administrators
In this Q&A, expert Michael Cobb explores separation of duties for security administrators with access to domain controllers and servers running Windows, UNIX and Linux.
-
Remote webcam security surveillance: Invasion of privacy?
Using remote webcam security surveillance to check the whereabouts of stolen laptops might seem like a good idea, but is it an invasion of privacy? In this expert response, Ernie Hayden discusses t...
-
How to grant local admin rights with Global Policy Objects
When granting local admin rights, it's important to do it securely. Learn how to use Global Policy Objects and global security groups to do it correctly.
-
Is a PCI DSS report on compliance confidential?
Learn about the confidentiality of a PCI report on compliance, and a compliance audit report in general in this expert response from Ernie Hayden.
-
Electronic access control system and biometrics authentication
Biometrics authentication and an electronic access control system can be closely related, but they're not the same thing. In this IAM expert response, Randall Gamby explains the difference.
-
Finding the most secure database for biometric security measures
Storing biometric data is different than storing other kinds of data, so what's the most secure database to use? Learn more about biometric data efficiency and database security features in this ex...
-
Security report template: How to write an executive report
Writing a security report for executives doesn't have to be difficult or extensive, but security management expert Ernie Hayden describes how to make it comprehensive and clear.
-
Tips for writing secure SQL database code
Writing secure code is always a challenge, but it is particularly necessary for SQL databases that would otherwise be vulnerable to SQL injection attacks. Get tips on how to write secure SQL databa...
-
Test a security architecture design without an IT security consultancy
While IT security consultancies can be helpful when trying to find flaws in an information security management framework, there are ways to do it without spending the money.
-
Creating a password-reset program with corporate text messaging
Learn how to use corporate text messaging as the cornerstone of an enterprise password-reset program in this expert response from Randall Gamby.
-
How to reduce PCI DSS security scope for an audit
PCI DSS audits can be a lot easier if the scope is narrow. Learn how to consolidate and store sensitive data in order to best reduce PCI DSS security scope.
-
Password security vaults: Is SSO authentication better?
Password security vaults may be able to aid users in remembering many different passwords, but are they the most secure solutions? IAM expert Randall Gamby gives his recommendations on setting pass...
-
How to talk to executives about an information security team hire
When hiring an information security team member, how important is a certification in information security? Learn how to talk to executives about making an uncertified hire.
-
Is it possible to crack the public key encryption algorithm?
Is it possible to create a PKI encryption key that is unbreakable? IAM expert Randall Gamby weighs in.
-
HIPAA and Social Security numbers in a hospital computer network
Learn when Social Security numbers can be used for patient identification without violating HIPAA patient confidentiality requirements.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO