-
How to mitigate the database-wiping Narilam malware
Expert Nick Lewis explains how the Narilam malware infects SQL databases and destroys corporate records, and offers advice on mitigation.
-
How to defend against the updated Makadocs malware
Security expert Nick Lewis details how the updated Makadocs malware uses Google Docs as a command and control server and offers mitigations for users.
-
Define pen testing scope to reduce risks
Expert Nick Lewis explains how to reduce penetration testing risks by limiting the scope of the test.
-
Flash marries Patch Tuesday: How to adjust patching
Expert Michael Cobb details whether third-party patch management program changes are necessary after the Adobe Flash marriage to Patch Tuesday.
-
Should enterprises steer clear of Dropbox?
Are Dropbox security concerns serious enough to require enterprise users to switch to secure Dropbox alternatives? Expert Michael Cobb discusses.
-
Should password policies cover users' third-party apps?
Expert Michael Cobb explains how password change frequency and reuse for third-party apps should be addressed in enterprise password policies.
-
Limit personal info to reduce OOO message security risk
Expert Michael Cobb details how to reduce out-of-office message security risk --and thus targeted attacks -- by limiting personal info given.
-
Prevent SQL injection attacks on user input fields
Expert Michael Cobb discusses how to prevent SQL injection attacks by validating user input and utilizing parameterized stored procedures.
-
Utilize security flaws in malicious RATs for defense
Nick Lewis discusses how to learn from RAT security flaws not only for defense, but also to find out more about attackers via offensive security.
-
Does miniFlame represent a threat to enterprises?
Expert Nick Lewis analyzes miniFlame, the plug-in for the Flame malware, to determine how it operates and whether enterprises should be concerned.
-
How blocking HLP files can prevent social engineering
Expert Nick Lewis explains how to prevent social engineering attacks that utilize Windows Help files by blocking attachments with the .hlp extension.
-
Assessing the impact of a DKIM protocol vulnerability
Expert Nick Lewis determines whether the DomainKeys Identified Mail protocol can still be safely relied upon for email authentication.
-
Analyzing updated man-in-the-browser attack techniques
Do man-in-the-browser attack prevention tactics need to be updated as the attacks themselves take on new characteristics? Expert Nick Lewis discusses.
-
Gaging automatic IP addressing security repercussions
Is automatic IP addressing a suitable option, or should network and security teams still manually assign IP addresses? Expert Brad Casey discusses.
-
Are VoIP phones still secure enough for enterprises?
In light of recent Cisco IP phone vulnerabilities, expert Brad Casey evaluates VoIP phone security and offers measures to secure VoIP phones.
-
How often should firewalls be tested?
Should firewall testing frequency be decided and documented when updating firewall policies? Expert Brad Casey discusses how often to test firewalls.
-
How to defend against brute-force SSH attacks
Expert Brad Casey discusses why effective brute-force SSH attack prevention means improving network monitoring instead of closing TCP port 22.
-
Is SSL decryption a viable network monitoring option?
Expert Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring method.
-
The reality of multivendor firewall management software
Matthew Pascucci discusses the limitations of using firewall management software to manage multivendor firewalls.
-
Must-have wireless IPS features
Matthew Pascucci offers tips for choosing a wireless intrusion prevention system, including what critical features to look for.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO