-
How to talk to executives after a data breach
In the wake of a data breach, how do you know when to talk to executives, and, more importantly, what to say? In this expert response, learn how to talk to executives after a data breach.
-
IT business justification to limit network access
Are you hoping to limit network access at your organization, but aren't sure how to go about creating an IT business justification for a proxy server? In this expert response, Randall Gamby explain...
-
Prevent password cracking with password management strategies
Passwords can be the weak link in any organization's security strategy. Learn how to protect your passwords from unauthorized users with these password management strategies from IAM expert Randall...
-
How to choose the best IT security certification for pen testing jobs
Looking to get into the world of penetration testing, and you're not sure which certification might help? In this expert response, David Mortman explains how to know if pursuing a certification is ...
-
How to prevent ActiveX security risks
Application expert Michael Cobb explains why ActiveX security relies entirely on human judgment.
-
Will a database anonymization implementation succeed?
Platform security expert Michael Cobb reviews the likelihood of success in a database anonymization implementation.
-
How serious is (ISC)2 about its code of ethics?
One of the many security certification requirements for the CISSP is signing the (ISC)2 code of ethics, but how seriously does (ISC)2 take certificate holders' adherence to that code?...
-
Should security tests be part of a software quality assurance program?
Application security expert Michael Cobb reviews the essentials of any software quality assurance process.
-
How to log in to multiple servers with federated single sign-on (SSO)
Single sign-on is a rapidly evolving technology that, when partnered with federation tools, can offer a greater and greater level of granularity for access control. Learn how from expert Randall Ga...
-
How to confirm the receipt of an email with security protocols
Many websites try to ensure secure registrations by sending email confirmations. But how is it possible to confirm receipt of that email by the correct recipient? Identity and access management exp...
-
How to perform an enterprise risk analysis
Some IT security best practices might not be right for your enterprise. In this expert response, learn how to perform an enterprise risk assessment and analysis to determine which of your resources...
-
What are the Mac OS X Snow Leopard antivirus features?
The latest Mac OS X, Snow Leopard, includes new antimalware protection. Don't get too excited, though, says application security expert Michael Cobb.
-
Where to find HIPAA resources for employee compliance training
Is your organization in the process of training employees for HIPAA compliance? Learn where to find HIPAA resources and HIPAA training tools to get the task done.
-
What are Google Chrome's security features?
In this expert response, Michael Cobb reviews the security features of Google Chrome.
-
Is there a way to block iPhone widgets that bypass Web filters?
If students are using your Wi-Fi to reach unapproved websites, you have the ability to take greater control of your network. Michael Cobb reviews the important aspects of a Web usage policy.
-
Will an application usage policy best control network bandwidth?
When it comes to speeding up the network, what works best: policy or technology? Both are important and should be used together, says expert Michael Cobb.
-
Should enterprises be concerned with Twitter in the workplace?
Expert Michael Cobb explains how concerned you should be with Twitter use inside the company.
-
What are new and commonly used public-key cryptography algorithms?
Expert Michael Cobb breaks down a variety of encryption algorithms and reviews the use cases for several types of cryptography.
-
Why should we place data files on a separate partition than the OS?
You may have always been taught to install applications on a different partition than the OS, but do you actually know why?
-
Are there still Google Desktop security problems?
Expert Michael Cobb explains why Google Desktop's "search across computers" feature has been so controversial.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO