-
Using a virtual firewall for cloud IaaS security
Matthew Pascucci discusses whether organizations should use an IaaS virtual firewall to protect applications that have been moved to the cloud.
-
Android remote-wipe vulnerability defense options
Expert Nick Lewis details the Android remote-wipe vulnerability targeting Samsung phones and provides mitigations for Android users.
-
How should enterprises advise users on shortened URLs?
Expert Nick Lewis delves into the potential threat posed by shortened URLs and what enterprises can do to protect users from malicious short URLs.
-
How to secure Oracle's database authentication process
A patch for an Oracle database authentication vulnerability was only released for version 12. Expert Nick Lewis discusses mitigations for 11.1 users.
-
Data recovery plan essential to Shamoon malware defense
Expert Nick Lewis discusses how to detect Shamoon malware and emphasizes the importance of detailed data backup and recovery plans.
-
How to protect iOS users from mobile phishing problems
With potential phishing problems surfacing for iOS users, expert Nick Lewis provides advice for enterprises facing the mobile phishing menace.
-
Assessing the security features of Windows Phone 8
Expert Michael Cobb assesses Windows Phone 8 security to determine whether WP8 devices are safe enough to replace the BlackBerry in the enterprise.
-
Will a bootkit thwart the security of Windows 8 UEFI?
With the release of a proof-of-concept bootkit for the Windows 8 platform, expert Michael Cobb assesses the potential threat to UEFI security.
-
Making security preparations for Windows RT devices
How should enterprises prepare for securing Windows RT devices? Expert Michael Cobb discusses the security differences between Windows RT and 8.
-
Analysis: Danger posed by Apple UDID security leak
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak.
-
Reexamine Windows password hints in security policies
Researchers have revealed potential Windows user password hint vulnerabilities. Expert Michael Cobb discusses how to address such attacks in policies.
-
How to choose an auditing firm
Expert Mike Chapple advises enterprises on how to choose an external auditor, focusing on four major qualities to look for in an auditing firm.
-
New MasterCard Level 2 merchant validation requirements
Expert Mike Chapple breaks down how Level 2 merchants can comply with MasterCard's new requirement for PCI self-assessments.
-
COBIT 5 training: What is required for certification?
Expert Mike Chapple offers advice for understanding COBIT and what it takes to acquire COBIT 5 certification.
-
Preparing for various DDoS attack scenarios
Expert Matthew Pascucci suggests four key questions to ask yourself when developing distributed denial-of-service attack mitigation tactics.
-
Firewall policy management for 5-tuple firewalls
Matt Pascucci explains how to implement firewall policy management for 5-tuple firewalls when ports must be kept open for business reasons.
-
Security risks of outsourcing network management
Is network management outsourcing the future of network security or too great a risk? Matthew Pascucci discusses the risks and rewards.
-
The insecure WEP protocol still widely used, but why?
Expert Matthew Pascucci weighs in on why so many enterprises still use the insecure wireless encryption protocols -- WPA and WEP.
-
Understanding 'big data' security issues
In this Ask the Expert video, Ernie Hayden answers the question of what 'big data' is and outlines big data security issues in this video.
-
Should enterprises worry about NFC security risks?
Security expert Nick Lewis explores the emerging security risks posed by NFC technology and discusses their effect on enterprise BYOD policy.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO