-
Should management processes change based on a patch release schedule?
Expert Michael Cobb explains why planned patch release schedules, though helpful, may alter they way you handle the deployment of your own updates.
-
Does an EULA make it truly illegal to decompile software?
Michael Cobb explores a legal minefield: the legality of software decompilation.
-
Should enterprises be concerned with Twitter in the workplace?
Expert Michael Cobb explains how concerned you should be with Twitter use inside the company.
-
Is there a way to block iPhone widgets that bypass Web filters?
If students are using your Wi-Fi to reach unapproved websites, you have the ability to take greater control of your network. Michael Cobb reviews the important aspects of a Web usage policy.
-
Will an application usage policy best control network bandwidth?
When it comes to speeding up the network, what works best: policy or technology? Both are important and should be used together, says expert Michael Cobb.
-
What are new and commonly used public-key cryptography algorithms?
Expert Michael Cobb breaks down a variety of encryption algorithms and reviews the use cases for several types of cryptography.
-
Are there still Google Desktop security problems?
Expert Michael Cobb explains why Google Desktop's "search across computers" feature has been so controversial.
-
How to find HIPAA transaction code sets and HITECH resources
Complying with HIPAA and the new HITECH regulations is no small matter, and that's where HIPAA transaction code sets and HITECH resources for compliance can help. Learn where to find these resource...
-
How to set up a split-tunnel VPN in Windows Vista
Setting up a split-tunnel VPN in Vista can help quicken network flow in the enterprise. In this expert response, Mike Chapple explains the steps to create a split-tunnel VPN.
-
How can URL-shortening services be manipulated?
Expert Michael Cobb explains why URL-shortening services are another avenue of attack.
-
Is my security program ready for Web application firewall deployment?
Expert Michael Cobb reviews how to make sure that a Web application firewall deployment will provide a real benefit.
-
Should Windows Mobile updates come from Microsoft?
As mobile phones become more like mini PCs, they need similar add-on security tools and patch processes to keep them safe. Michael Cobb reviews how to manage Windows Mobile updates.
-
What are the export limitations for AES data encryption?
Although AES is free for any use public or private, commercial or non-commercial programs that provide encryption capabilities are subject to U.S. export controls. Expert Michael Cobb reviews the l...
-
Is Word document-comparison software SOX compliant?
The SOX audit process can be daunting, especially when it comes to finding SOX-compliant software. In this expert response, learn whether Word document-comparison software is SOX compliant.
-
What is the difference between static and dynamic network validation?
Network data analysis is essential to understanding the security configuration of your network. But what is the difference between static data validation and dynamic data validation? Find out in th...
-
Verifying the security of software with static and dynamic verification
Secure software is critical to all businesses, and security verification is an important part of that process. In this expert response, learn the difference between static and dynamic verification ...
-
With McColo shut down, has spam decreased?
Expert Michael Cobb explains how the shutdown of the San Jose-based Web hosting service provider actually impacted spam levels.
-
Port scan attack prevention best practices
While it's impossible to prevent against all port scanning attacks, there are best practices for port scanning security (such as a port scanning firewall) that can keep your network secure. Expert ...
-
A recovery point objective (RPO) vs. a recovery time objective (RTO)
When making business continuity and disaster recovery plans, it's essential to come up with a recovery point objective (RPO) and a recovery time objective (RTO), but what is the difference between ...
-
Securing the intranet with remote access VPN security
Connecting remote offices with the main branch can be done many ways, but for those companies looking at tightly securing their intranet, they may need to consider remote access with VPN security. ...
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO