-
How to secure a .pdf file
In this expert Q&A, Michael Cobb explains how to avoid malicious content that is embedded into .pdf documents.
-
What patch management metrics does Project Quant use?
In this Q&A, expert Michael Cobb reviews the open patch management metrics model called Project Quant.
-
How to encrypt passwords using network security certificates
Learn the most secure way to transfer passwords to applications using network security, identity management, and application security certificates.
-
How to destroy data on a hard drive to comply with HIPAA regulations
Looking to destroy HIPAA data on a hard drive? Learn the best way to destroy a hard drive to comply with HIPAA regulations in this expert response from David Mortman.
-
Prevent meet-in-the-middle attacks with TDES encryption
Don't let meet-in-the-middle attacks decrypt your sensitive data. Learn how to use the triple DES encryption algorithm to prevent such attacks, with expert Randall Gamby.
-
How to provide access to Web content (while ensuring network security)
A reader asks expert Michael Cobb how healthcare organizations should allow Web access without compromising network security.
-
How to use single sign-on (SSO) for a server configuration
Using SSO for a server configuration can be done a few different ways. Learn more in this expert response from Randall Gamby.
-
Technology to automate SOX compliance according to COBIT frameworks
How effective are automated compliance solutions at easing a enterprise's compliance burden? In this expert response, learn what resources can be most helpful for your enterprise when complying wit...
-
Disaster recovery risk assessment for cyberterrorism attacks
In recent days, the threat of cyberterrorism attacks seems to loom darker. In this expert response, learn whether cyberterrorism threats should be feared and how to prepare for them.
-
Choosing management for Active Directory user provisioning
Who's in charge of Active Directory user provisioning at your organization? Learn how to choose the most effective user provisioning management method from expert Randall Gamby.
-
How to protect employee information in email paystubs
Many companies are moving to a system of paperless paystubs. Learn how to protect the information contained in these email paystubs with the use of secure email in this expert response.
-
LDAP signing requirements for various directory configurations
While there is no longer a standard directory configuration, it is still possible to implement LDAP signing in most environments. Learn more about LDAP signing requirements from IAM expert Randall ...
-
Can malware source code be used to stop a virus or worm?
Source code is a valuable tool to stop malware, and it can make malicious code analysis more effective and successful.
-
What is an encryption collision?
Michael Cobb reviews how encryption collision attacks on cryptographic hash functions could compromise the security of all kinds of digital systems.
-
Should developers create libraries of common cryptographic algorithms?
In this expert response, Michael Cobb explains why developers don't need to create their own cryptolibraries.
-
Do Facebook URL security concerns justify blocking social networks?
Michael Cobb explains why the privacy concerns with Facebook URLs are not a serious threat to the enterprise.
-
How to secure USB ports on Windows machines
A readers asks expert Michael Cobb about which product can best secure USB ports.
-
What is the best database patch management process?
Michael Cobb reviews how to handle database patches in the enterprise.
-
User account best practices for an investment management website
When creating online user accounts for an investment management website, security is key. Learn user account best practices from IAM expert Randall Gamby.
-
How to determine password strength for a website
Strong passwords are essential for an enterprise's online security, but how can you determine password strength? Learn more in this IAM expert response from Randall Gamby.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO