• Login
  • Become a member
  • RSS
  • Part of the TechTarget network
SearchSecurity.com
  • News
    • Latest Headlines
      • Patch Tuesday September 2013: Critical bulletins for Office, SharePoint, IE
      • Damballa adds HTTP request profiling to its ATP platform
      • NYT cyberattack neatly sidestepped by big data
      • View All News
    • Featured
      • Information Security Magazine

        The information security pro’s resource for keeping corporate data, applications and devices secure

        Download Now!
  • Premium
    Editorial
    • E-Books
      • Technical guide to secure collaboration software
      • Technical guide on PCI: Global compliance trends
      • Technical guide to Web security gateways
      • View All E-Books
    • E-Zines
      • Information Security magazine
      • Information Security magazine archives
      • Information Security magazine subscription/renewal
      • Information Security magazine calendar
      • View All E-Zines
    • E-Handbooks
      • Developing your endpoint security management transition plan
      • Emerging threat detection techniques and products
      • Enterprise network security visibility: Beyond traditional defenses
      • View All E-Handbooks
  • Multimedia
      • Videos
      • Gary McGraw Silver Bullet Podcast
      • Screencasts
      • Webcasts
      • Podcasts
      • Slideshows
  • Security
    Topics
    • Topics
      • Enterprise Data Protection
      • Application and Platform Security
      • Enterprise Identity and Access Management
      • Government IT Security Management
      • Information Security Threats
      • Information Security Careers, Training and Certifications
      • Security Audit, Compliance and Standards
      • Security for the Channel
      • Enterprise Network Security
      • Information Security Management
    • Hot Topics
      • Security Management Strategies for the CIO
      • Security patch management and Windows Patch Tuesday news
      • PCI Data Security Standard
      • Disk Encryption and File Encryption
  • Tutorials
    • Advice & Tutorials
      • Security School Course Catalog from SearchSecurity.com
      • Information Security Learning Guides
      • Information security book excerpts and reviews
      • Wireless Security Lunchtime Learning with Lisa Phifer
      • Information security podcasts
      • Screencasts: On-screen demonstrations of security tools
      • View All Tutorials
    • Technology Dictionary
      • Find definitions and links to technical resources
      • Powered by WhatIs.com
  • Expert
    Advice
    • Tips
      • A decade later: SOX program management best practices
      • Using a next-gen firewall to determine application access policies
      • IT security frameworks and standards: Choosing the right one
      • View All Tips
    • Answers
      • The 2013 OWASP Top 10 list: What's changed and how to respond
      • Does Content-Agnostic Malware Protection improve Chrome security?
      • Do two-factor authentication vulnerabilities outweigh the benefits?
      • View All Answers
    • Ask a Question
      • Get help from our technical community
      • Powered By ITKnowledgeExchange.com
  • White
    Papers
    • Research Library
      • White Papers
      • Business Webcasts
      • Downloads
      • Powered by Bitpipe.com
    • Product Demos
      • Try out software demos
      • Powered By 2020Software.com
    • Resource Centers
      • View All Resource Centers
  • Blogs
    • Blogs
      • More Security Blogs
      • Security Corner with Ken Harthun
      • Security Wire Weekly
      • More Security Blogs
      • Powered By ITKnowledgeExchange.com
  • Certification
    Central
      • CISSP Practice Test
      • Earn CPE Credit
  • Home
  • Ask the Experts
  • Submit your questions about infosec threats

    Nick Lewis is standing by to give you free, unbiased advice on information security threats.

  • Submit your questions about IAM

    Randall Gamby is standing by to give you free, unbiased advice on identity and access management.

  • Submit your questions about application security

    Michael Cobb is standing by to give you free, unbiased advice on application security.

  • Meet All Experts

Submit a question to our experts

Expert Answers

  • Using SDN for network access protection

    Expert Matthew Pascucci discusses the possible security implications of using software-defined networking for network access protection.

  • How to monitor and protect audit logs

    Is it possible to make audit logs tamper-proof? Expert Matthew Pascucci offers best practices for audit log security and monitoring.

  • Evaluating Huawei router security

    Security expert Matthew Pascucci discusses Huawei router security and offers four tips for evaluating the security of enterprise network equipment.

  • Security concerns for Cisco 802.11ac gigabit wireless

    Expert Matt Pascucci discusses how the new Cisco 802.11ac wireless standard differs from others and possible security implications of gigabit Wi-Fi.

  • How to determine IPS throughput requirements

    Several factors go into determining IPS throughput requirements. Expert Matt Pascucci explains in this Q&A.

  • Must-haves for a log management product

    Matt Pascucci discusses what to look for when evaluating a log management product and whether syslog format should be a requirement.

  • Determining the ROI of network malware detection

    Consider the pros and cons of network malware detection when calculating ROI, says expert Matt Pascucci.

  • What to look for in an Ethernet switch

    Matt Pascucci discusses what to look for when choosing an Ethernet switch, and whether or not to splurge on enterprise Ethernet switches.

  • Developing a remote management tool policy

    Matt Pascucci offers advice for developing a policy on secure use of remote management tools by network security staff.

  • Evaluating full-packet-capture network logging tools

    Matt Pascucci explains what to look for in full-packet-capture network logging and network forensic tools, and areas to focus on during the search.

  • Why merchants still store unencrypted credit card data

    Mike Chapple offers four possible reasons why some merchants still store unencrypted credit card data after years of PCI DSS compliance requirements.

  • Is PCI SSC's QIR program a new audit requirement?

    Mike Chapple breaks down PCI SSC's new Qualified Integrators and Resellers (QIR) program, explaining the compliances requirements for merchants.

  • HIPAA Security Rule and meaningful use rule differences

    Expert Mike Chapple discusses the HIPAA Security Final Rule and the meaningful use rule, including what each entails and how they differ.

  • How Windows 8 ELAM helps secure the boot process

    Expert Michael Cobb details how the Windows 8 ELAM feature can detect rootkits and other malicious drivers, help secure the Windows boot process.

  • Has application whitelisting supplanted blacklisting?

    Which method is better at fighting next-gen malware? Security expert Michael Cobb weighs in on the application whitelisting vs. blacklisting debate.

  • Can enterprises trust Adobe software with sandboxing?

    Expert Michael Cobb assesses the impact of sandboxing on Adobe Acrobat and Adobe Reader security. Can enterprises trust Adobe's new security methods?

  • Does 'Binging it' lead to more search engine poisoning?

    Is Microsoft's Bing search engine more susceptible to search engine poisoning than Google? Expert Michael Cobb discusses Bing security.

  • Privacy lessons learned from Microsoft SLA changes

    Should enterprises be concerned about Microsoft services agreement changes after the Google privacy policy fiasco? Expert Michael Cobb discusses.

  • Prioritizing the need to update Cisco routers

    Matthew Pascucci discusses how to prioritize the need to update Cisco routers, and offers patch management tips for enterprises.

  • How will the HSTS protocol affect Web security?

    Matthew Pascucci discusses what effect the new HSTS protocol could have on Web security and on preventing man-in-the-middle attacks.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
More from Related TechTarget Sites
  • Cloud Security
  • Consumerization
  • Financial Security
  • SMB Security
  • Security AU
  • Security IN
  • Computer Weekly
  • Cloud Security
    • Echopass achieves PCI Level 1 certification; CISO offers PCI guidance

      On the heels of Echopass achieving PCI Level 1 certification, CISO Dennis Empey offers PCI guidance for other cloud providers navigating the process.

    • SearchCloudSecurity's Cloud computing security certification guide

      Certification expert Ed Tittel examines the growing number of cloud computing security certifications, both vendor-neutral and vendor-specific.

    • CSA exec: Cloud defense demands intelligent security strategy

      Video: Cloud Security Alliance COO John Howie discusses the 'intelligent security' strategy necessary for cloud providers to defeat targeted attacks.

  • Consumerization
    • Apple's free iWork suite provides alternative to Office for iOS

      Apple's free iWork is considered a Trojan horse, since it gives new iOS device users an office productivity suite ahead of Microsoft Office for iOS.

    • Consumer cloud services: Friend or foe?

      IT and workers alike can reap benefits from using the consumer cloud, but admins have to get past the concerns over data security first.

    • Notebooks or tablets: Which to choose for mobile workers

      A mobile workforce that uses the cloud needs their company to think about end-user segmentation to determine the best devices for their needs.

  • searchFinancialSecurity
    • PayPal CISO: Laws must foster better cybersecurity information sharing

      PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.

    • Cybergang plans to use Trojan against U.S. banks

      A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.

    • Improved Shylock Trojan targets banking users

      The latest variant of the banking Trojan is causing numerous problems, Symantec said.

  • searchMidmarketSecurity
    • Windows Phone 7 security: Assessing WP7 security features

      Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.

    • Choosing the best security certifications for your career

      Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.

    • Midmarket security tutorials

      SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.

  • searchSecurityAU
    • NYT cyberattack neatly sidestepped by big data

      Big data analysis of IP addresses performed by OpenDNS kept some 50 million users from falling prey to the hijacking of The New York Times website.

    • How to assess cloud risk tolerance

      Assessing risk tolerance is a key part of a cloud risk management strategy. In this tip expert Ed Moyle explains how to assess cloud risk tolerance.

    • TPM security overview: Defining the benefits of TPM devices

      The nearly ubiquitous TPM device is an often-overlooked tool in an infosec pro's arsenal. Expert Michael Cobb details the benefits of TPM security.

  • Information Security
    • Android-based mobile malware rises – but what is the risk to Indian businesses?

      Mobile-dependent Indian businesses must secure networks against viruses as McAfee reports a large jump in Android-based malware

    • Dropbox can be hacked, say security researchers

      Security researchers say they bypassed the security of cloud-based storage service Dropbox and gained access to private user files

    • Android mobile malware rebounds in Q2, reports McAfee

      Android-based malware has grown 35% in the second quarter, according to the latest threat report from security firm McAfee

  • Computer Weekly
    • Cyber insurance: Understanding the legal language

      CIOs worried about cyber risk are increasingly turning to cyber insurance to offset risk. But is the cover as black and white as it first seems?

    • After virtualising IT estate, Jaguar Land Rover now eyes cloud computing

      Jaguar Land Rover's IT team takes its newly virtualised infrastructure to the next stage of IT evolution by adopting cloud-based services

    • Will the iPhone 5S’s fingerprint technology help enterprise security?

      A fingerprint sensor has been built into Apple's latest iPhones. Computer Weekly looks at what this means for enterprise security

All Rights Reserved,Copyright 2000 - 2013, TechTarget
  • About Us
  • Contact Us
  • Site Index
  • Privacy policy
  • Advertisers
  • Business partners
  • Events
  • Media kit
  • TechTarget Corporate site
  • Reprints
  • Archive
  • Site map