-
Disabling Java in face of cross-platform malware
Expert Nick Lewis advises enterprises to disable Java to defend against cross-platform malware that targets JRE vulnerabilities.
-
Using ISO 27002 as a guide for security management
Learn the difference between ISO 27001 and ISO 27002, and how the latter can be used to build an infosec program.
-
Submitting an ROC via a PCI assessment provider
Can companies submit a report on compliance to a new credit card transaction processor via a PCI assessment provider? Mike Chapple discusses.
-
Cryptosystem regulatory compliance requirements
Mike Chapple discusses what to look for in a cryptographic system from a legal and regulatory compliance standpoint.
-
How to choose a PCI employee training program
Expert Mike Chapple offers options for companies seeking a PCI awareness training program for employees.
-
Getting C-level support for ongoing PCI compliance
Expert Mike Chapple offers advice on how security professionals can obtain C-level support for ongoing PCI compliance.
-
How to remediate common IT audit findings
Expert Mike Chapple uncovers some of the most common -- and embarrassing -- IT audit findings and explains how to remediate each one.
-
Defending against remote access software attacks
Expert Nick Lewis explains why remote access software is such a common attack target before providing simple steps to achieve secure remote access.
-
Does Adobe Reader's technical debt pose security risks?
Adobe Reader's technical debt may pose too great a security risk for some enterprises. Security expert Nick Lewis advises turning to alternative PDF readers.
-
When BYOD security policy fails, what's next?
Security expert Nick Lewis suggests how each individual enterprise can deal with mobile security risk by instituting a BYOD security policy to fit its needs.
-
Defend against iPad exploit, rogue access point attacks
An iPad exploit that attacks a rogue access point is dangerous for enterprises and home users. Expert Nick Lewis explains how to defend against it.
-
Adjusting privacy settings for better Facebook security
Expert Nick Lewis discusses how Facebook cloaking exposed users' personal info and why it's important to control social media security settings.
-
What is the Havij SQL injection tool capable of?
Expert Nick Lewis discusses the dangers of the SQL injection tool Havij and provides tips to protect the enterprise against other SQL injection tools.
-
How to defend against Pinterest spamming, other attacks
Expert Nick Lewis discusses the state of Pinterest security and provides info on preventing Pinterest spamming and other social engineering attacks.
-
H.264 vs Flash: H.264 as a secure alternative to Flash
Can the H.264 video codec serve as a more secure Flash alternative? Expert Nick Lewis provides a security breakdown of H.264 vs Flash.
-
Establish device requirements in BYOD security policy
How can enterprises mitigate the BYOD risk? Expert Michael Cobb suggests some device requirements to include in a BYOD security policy.
-
How to harden Macs against Flashback-style malware
The recent Flashback malware proved attackers are targeting Macs, too. Learn how to improve Mac hardening against future Mac malware.
-
How attackers use statistics to enhance attacks
Expert Michael Cobb provides some cybercrime statistics and discusses how organized cybercrime is using free Web analytics tools to plan attacks.
-
What's needed to secure Windows 8 BYOD tablets?
How should enterprises be preparing for Windows 8 BYOD tablets? Expert Michael Cobb breaks down the security features for Microsoft's upcoming OS.
-
Verizon DBIR 2012: Key Web app security takeaways
Expert Michael Cobb analyzes takeaways from the Verizon DBIR 2012 report regarding Web app security and the need for more basic security measures.
-
Submit your questions about infosec threats
Nick Lewis is standing by to give you free, unbiased advice on information security threats.
-
Submit your questions about IAM
Randall Gamby is standing by to give you free, unbiased advice on identity and access management.
-
Submit your questions about application security
Michael Cobb is standing by to give you free, unbiased advice on application security.
Security Management Strategies for the CIO