-
When to opt for open source security tools
Open source security tools can help stretch your IT security budget further -- that is, if you use them strategically. Joseph Granneman explains how.
-
How a security technologist can become a CISO
Security technologists aspiring to become CISOs must develop a variety of business skills, as Joe Granneman explains in this Ask the Expert Q&A.
-
What are the basic requirements to join an ISAC?
Joe Granneman explains how ISACs enable cybersecurity information sharing and the basic requirements for joining an ISAC.
-
How to harden legacy applications with Microsoft's EMET
Expert Michael Cobb details how using EMET, a free tool from Microsoft, can harden Windows XP and other legacy applications.
-
Analysis: How BlackBerry 10's password blacklist works
Expert Michael Cobb reacts to the BlackBerry 10 password blacklist and determines whether enterprises could adopt it to further secure passwords.
-
Google Play Private Channel: Better than app stores?
Is the Google Private Channel a more secure option than building an internal enterprise app store? Expert Michael Cobb discusses.
-
How to mitigate Adobe Shockwave Player security issues
Expert Michael Cobb discusses Adobe Shockwave security issues highlighted by US-CERT, and details how a Web security gateway is one way to allay them.
-
Validating Web app security: Pen test or code review?
For Web application security testing, if cash is tight, should a penetration test top an application code review? Michael Cobb explains his choice.
-
Virtual security gateways: Hype or necessity?
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product.
-
Effects of the cloud on network security skills
Will the ongoing adoption of cloud technology affect the skills that network security engineers need in the future? Matt Pascucci discusses.
-
Assessing the security of fiber optic networking
Matthew Pascucci discusses the potential security risks associated with fiber optic networking.
-
Where to start when designing a secure network
When designing a secure network segmentation, monitoring, logging and encryption should be a priority. Matt Pascucci explains in this expert Q&A.
-
What to do when agents email credit card numbers
Emailing unencrypted credit card numbers is a violation of PCI DSS. Learn how to stop customer service agents from practicing this dangerous act.
-
How to address PCI compliance in the cloud
Expert Mike Chapple offers advice on how to address PCI compliance when moving systems to the public cloud.
-
Criteria for evaluating PCI consultants
PCI consultants can help organizations achieve PCI DSS compliance, but first you must choose the right one.
-
Social media compliance and security tips
Expert Mike Chapple offers regulatory compliance advice regarding the management of enterprise social media accounts.
-
Compliance teams and the request for proposals process
Procurement personnel should know when to include the compliance team in the request for proposals process.
-
Security controls for the Foreign Corrupt Practices Act
Expert Mike Chapple explains the Foreign Corrupt Practices Act and the security controls required for compliance.
-
How to avoid disaster when devices are lost or stolen
Mike Chapple explains how enterprises can help lessen the impact of lost or stolen devices as part of HIPAA compliance training.
-
How to stop DNS resolver abuse, DDoS amplification
Expert Nick Lewis details how misconfigured DNS resolvers can be used for DDoS DNS attacks and how organizations can secure them.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO