-
The pros and cons of implementing smart cards
Most infosec pros agree that smart cards create a higher level of enterprise security than passwords alone. Learn how to weigh the pros and cons of smart cards to know if they're right for your ent...
-
Keep files from being deleted by assigning read and execute permission
What's the best way to keep employees from deleting important files and folders? Learn more from IAM expert Randall Gamby.
-
Is credit card tokenization a better option than encryption?
Platform security expert Michael Cobb reviews alternatives to encryption that will help protect sensitive data.
-
How to talk to executives after a data breach
In the wake of a data breach, how do you know when to talk to executives, and, more importantly, what to say? In this expert response, learn how to talk to executives after a data breach.
-
IT business justification to limit network access
Are you hoping to limit network access at your organization, but aren't sure how to go about creating an IT business justification for a proxy server? In this expert response, Randall Gamby explain...
-
Prevent password cracking with password management strategies
Passwords can be the weak link in any organization's security strategy. Learn how to protect your passwords from unauthorized users with these password management strategies from IAM expert Randall...
-
How to choose the best IT security certification for pen testing jobs
Looking to get into the world of penetration testing, and you're not sure which certification might help? In this expert response, David Mortman explains how to know if pursuing a certification is ...
-
How to prevent ActiveX security risks
Application expert Michael Cobb explains why ActiveX security relies entirely on human judgment.
-
Will a database anonymization implementation succeed?
Platform security expert Michael Cobb reviews the likelihood of success in a database anonymization implementation.
-
How serious is (ISC)2 about its code of ethics?
One of the many security certification requirements for the CISSP is signing the (ISC)2 code of ethics, but how seriously does (ISC)2 take certificate holders' adherence to that code?...
-
Should security tests be part of a software quality assurance program?
Application security expert Michael Cobb reviews the essentials of any software quality assurance process.
-
How to log in to multiple servers with federated single sign-on (SSO)
Single sign-on is a rapidly evolving technology that, when partnered with federation tools, can offer a greater and greater level of granularity for access control. Learn how from expert Randall Ga...
-
How to confirm the receipt of an email with security protocols
Many websites try to ensure secure registrations by sending email confirmations. But how is it possible to confirm receipt of that email by the correct recipient? Identity and access management exp...
-
How to perform an enterprise risk analysis
Some IT security best practices might not be right for your enterprise. In this expert response, learn how to perform an enterprise risk assessment and analysis to determine which of your resources...
-
What are the Mac OS X Snow Leopard antivirus features?
The latest Mac OS X, Snow Leopard, includes new antimalware protection. Don't get too excited, though, says application security expert Michael Cobb.
-
Where to find HIPAA resources for employee compliance training
Is your organization in the process of training employees for HIPAA compliance? Learn where to find HIPAA resources and HIPAA training tools to get the task done.
-
What are Google Chrome's security features?
In this expert response, Michael Cobb reviews the security features of Google Chrome.
-
Should businesses delay Windows Vista adoption and just buy Windows 7?
In many ways, the security features in Windows 7 are the result of Vista users' feedback and experiences. But should enterprises adopt the OS right away?
-
What are new and commonly used public-key cryptography algorithms?
Expert Michael Cobb breaks down a variety of encryption algorithms and reviews the use cases for several types of cryptography.
-
Should enterprises be concerned with Twitter in the workplace?
Expert Michael Cobb explains how concerned you should be with Twitter use inside the company.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO