-
Using SDN for network access protection
Expert Matthew Pascucci discusses the possible security implications of using software-defined networking for network access protection.
-
How to monitor and protect audit logs
Is it possible to make audit logs tamper-proof? Expert Matthew Pascucci offers best practices for audit log security and monitoring.
-
Evaluating Huawei router security
Security expert Matthew Pascucci discusses Huawei router security and offers four tips for evaluating the security of enterprise network equipment.
-
Security concerns for Cisco 802.11ac gigabit wireless
Expert Matt Pascucci discusses how the new Cisco 802.11ac wireless standard differs from others and possible security implications of gigabit Wi-Fi.
-
How to determine IPS throughput requirements
Several factors go into determining IPS throughput requirements. Expert Matt Pascucci explains in this Q&A.
-
Must-haves for a log management product
Matt Pascucci discusses what to look for when evaluating a log management product and whether syslog format should be a requirement.
-
Determining the ROI of network malware detection
Consider the pros and cons of network malware detection when calculating ROI, says expert Matt Pascucci.
-
What to look for in an Ethernet switch
Matt Pascucci discusses what to look for when choosing an Ethernet switch, and whether or not to splurge on enterprise Ethernet switches.
-
Developing a remote management tool policy
Matt Pascucci offers advice for developing a policy on secure use of remote management tools by network security staff.
-
Evaluating full-packet-capture network logging tools
Matt Pascucci explains what to look for in full-packet-capture network logging and network forensic tools, and areas to focus on during the search.
-
Why merchants still store unencrypted credit card data
Mike Chapple offers four possible reasons why some merchants still store unencrypted credit card data after years of PCI DSS compliance requirements.
-
Is PCI SSC's QIR program a new audit requirement?
Mike Chapple breaks down PCI SSC's new Qualified Integrators and Resellers (QIR) program, explaining the compliances requirements for merchants.
-
HIPAA Security Rule and meaningful use rule differences
Expert Mike Chapple discusses the HIPAA Security Final Rule and the meaningful use rule, including what each entails and how they differ.
-
How Windows 8 ELAM helps secure the boot process
Expert Michael Cobb details how the Windows 8 ELAM feature can detect rootkits and other malicious drivers, help secure the Windows boot process.
-
Has application whitelisting supplanted blacklisting?
Which method is better at fighting next-gen malware? Security expert Michael Cobb weighs in on the application whitelisting vs. blacklisting debate.
-
Can enterprises trust Adobe software with sandboxing?
Expert Michael Cobb assesses the impact of sandboxing on Adobe Acrobat and Adobe Reader security. Can enterprises trust Adobe's new security methods?
-
Does 'Binging it' lead to more search engine poisoning?
Is Microsoft's Bing search engine more susceptible to search engine poisoning than Google? Expert Michael Cobb discusses Bing security.
-
Privacy lessons learned from Microsoft SLA changes
Should enterprises be concerned about Microsoft services agreement changes after the Google privacy policy fiasco? Expert Michael Cobb discusses.
-
Prioritizing the need to update Cisco routers
Matthew Pascucci discusses how to prioritize the need to update Cisco routers, and offers patch management tips for enterprises.
-
How will the HSTS protocol affect Web security?
Matthew Pascucci discusses what effect the new HSTS protocol could have on Web security and on preventing man-in-the-middle attacks.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO