-
How to destroy data on a hard drive to comply with HIPAA regulations
Looking to destroy HIPAA data on a hard drive? Learn the best way to destroy a hard drive to comply with HIPAA regulations in this expert response from David Mortman.
-
Prevent meet-in-the-middle attacks with TDES encryption
Don't let meet-in-the-middle attacks decrypt your sensitive data. Learn how to use the triple DES encryption algorithm to prevent such attacks, with expert Randall Gamby.
-
How to provide access to Web content (while ensuring network security)
A reader asks expert Michael Cobb how healthcare organizations should allow Web access without compromising network security.
-
How to use single sign-on (SSO) for a server configuration
Using SSO for a server configuration can be done a few different ways. Learn more in this expert response from Randall Gamby.
-
Technology to automate SOX compliance according to COBIT frameworks
How effective are automated compliance solutions at easing a enterprise's compliance burden? In this expert response, learn what resources can be most helpful for your enterprise when complying wit...
-
Disaster recovery risk assessment for cyberterrorism attacks
In recent days, the threat of cyberterrorism attacks seems to loom darker. In this expert response, learn whether cyberterrorism threats should be feared and how to prepare for them.
-
Choosing management for Active Directory user provisioning
Who's in charge of Active Directory user provisioning at your organization? Learn how to choose the most effective user provisioning management method from expert Randall Gamby.
-
How to protect employee information in email paystubs
Many companies are moving to a system of paperless paystubs. Learn how to protect the information contained in these email paystubs with the use of secure email in this expert response.
-
LDAP signing requirements for various directory configurations
While there is no longer a standard directory configuration, it is still possible to implement LDAP signing in most environments. Learn more about LDAP signing requirements from IAM expert Randall ...
-
Can malware source code be used to stop a virus or worm?
Source code is a valuable tool to stop malware, and it can make malicious code analysis more effective and successful.
-
Do Facebook URL security concerns justify blocking social networks?
Michael Cobb explains why the privacy concerns with Facebook URLs are not a serious threat to the enterprise.
-
What is the best database patch management process?
Michael Cobb reviews how to handle database patches in the enterprise.
-
How to secure USB ports on Windows machines
A readers asks expert Michael Cobb about which product can best secure USB ports.
-
What is an encryption collision?
Michael Cobb reviews how encryption collision attacks on cryptographic hash functions could compromise the security of all kinds of digital systems.
-
Should developers create libraries of common cryptographic algorithms?
In this expert response, Michael Cobb explains why developers don't need to create their own cryptolibraries.
-
User account best practices for an investment management website
When creating online user accounts for an investment management website, security is key. Learn user account best practices from IAM expert Randall Gamby.
-
How to determine password strength for a website
Strong passwords are essential for an enterprise's online security, but how can you determine password strength? Learn more in this IAM expert response from Randall Gamby.
-
The pros and cons of implementing smart cards
Most infosec pros agree that smart cards create a higher level of enterprise security than passwords alone. Learn how to weigh the pros and cons of smart cards to know if they're right for your ent...
-
Keep files from being deleted by assigning read and execute permission
What's the best way to keep employees from deleting important files and folders? Learn more from IAM expert Randall Gamby.
-
Is credit card tokenization a better option than encryption?
Platform security expert Michael Cobb reviews alternatives to encryption that will help protect sensitive data.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO