-
Google shows why enterprises need to reassess Wi-Fi
Expert Nick Lewis explains the Google Street View controversy and why enterprises should be anxious about their wireless network security, not Google.
-
How Android users can avoid the LeNa malare
Android users can't rely on slowly deployed carrier updates to protect them from the LeNa malware. Expert Nick Lewis explains.
-
Mozilla fights malicious plug-ins in Firefox security
Will Mozilla's possible support of a browser plug-in check improve Firefox security? Expert Nick Lewis discusses the pros and cons of the feature.
-
Disabling Java in face of cross-platform malware
Expert Nick Lewis advises enterprises to disable Java to defend against cross-platform malware that targets JRE vulnerabilities.
-
Using ISO 27002 as a guide for security management
Learn the difference between ISO 27001 and ISO 27002, and how the latter can be used to build an infosec program.
-
Submitting an ROC via a PCI assessment provider
Can companies submit a report on compliance to a new credit card transaction processor via a PCI assessment provider? Mike Chapple discusses.
-
Cryptosystem regulatory compliance requirements
Mike Chapple discusses what to look for in a cryptographic system from a legal and regulatory compliance standpoint.
-
How to choose a PCI employee training program
Expert Mike Chapple offers options for companies seeking a PCI awareness training program for employees.
-
Getting C-level support for ongoing PCI compliance
Expert Mike Chapple offers advice on how security professionals can obtain C-level support for ongoing PCI compliance.
-
How to remediate common IT audit findings
Expert Mike Chapple uncovers some of the most common -- and embarrassing -- IT audit findings and explains how to remediate each one.
-
Defending against remote access software attacks
Expert Nick Lewis explains why remote access software is such a common attack target before providing simple steps to achieve secure remote access.
-
Does Adobe Reader's technical debt pose security risks?
Adobe Reader's technical debt may pose too great a security risk for some enterprises. Security expert Nick Lewis advises turning to alternative PDF readers.
-
When BYOD security policy fails, what's next?
Security expert Nick Lewis suggests how each individual enterprise can deal with mobile security risk by instituting a BYOD security policy to fit its needs.
-
Defend against iPad exploit, rogue access point attacks
An iPad exploit that attacks a rogue access point is dangerous for enterprises and home users. Expert Nick Lewis explains how to defend against it.
-
Adjusting privacy settings for better Facebook security
Expert Nick Lewis discusses how Facebook cloaking exposed users' personal info and why it's important to control social media security settings.
-
What is the Havij SQL injection tool capable of?
Expert Nick Lewis discusses the dangers of the SQL injection tool Havij and provides tips to protect the enterprise against other SQL injection tools.
-
How to defend against Pinterest spamming, other attacks
Expert Nick Lewis discusses the state of Pinterest security and provides info on preventing Pinterest spamming and other social engineering attacks.
-
H.264 vs Flash: H.264 as a secure alternative to Flash
Can the H.264 video codec serve as a more secure Flash alternative? Expert Nick Lewis provides a security breakdown of H.264 vs Flash.
-
Establish device requirements in BYOD security policy
How can enterprises mitigate the BYOD risk? Expert Michael Cobb suggests some device requirements to include in a BYOD security policy.
-
How to harden Macs against Flashback-style malware
The recent Flashback malware proved attackers are targeting Macs, too. Learn how to improve Mac hardening against future Mac malware.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO