-
PCI management: The case for Web application firewalls
Expert Michael Cobb lays out the compliance and security benefits of Web application firewalls.30 Jun 2009
-
Juniper pulls ATM hacking presentation from Black Hat
Researcher planned to demonstrate a hacking technique targeting the underlying software of a new ATM.30 Jun 2009
-
Common PCI questions: Web application firewalls or source code review?
Is it better to use Web application firewalls, automated source code security reviews or vulnerability scans? Michael Cobb reviews your options.30 Jun 2009
-
Screencast: Samurai offers pen-testing nirvana
Peter Giannoulis of The AcademyPro and The Academy Home demonstrates the Samurai Web Testing Framework, a free, live Linux distro pre-configured to function as a stand-alone Web pen-testing environ...29 Jun 2009
-
New Trojan stealing FTP credentials, attacking FTP websites
A new Trojan has collected up to 80,000 unique FTP server logins and is injecting malicious code into thousands of FTP websites.29 Jun 2009
-
MasterCard increases PCI compliance requirements for some merchants
Company now requires merchants that process one million to six million transactions annually to have onsite assessment by a PCI QSA. Visa says it won't follow suit.29 Jun 2009
-
HHS HIPAA guidance on encryption requirements and data destruction
Complying with HIPAA is only becoming more challenging. Fortunately, the Department of Health and Human Services has recently released some preliminary guidelines on how to deal with HIPAA's encryp...26 Jun 2009
-
How to select a set of network security audit guidelines
A network security audit can be a daunting task, but there are resources that can help. Mike Chapple, network security expert, weighs in on why and how to choose a security audit standard.26 Jun 2009
-
How to compartmentalize WiFi traffic with a VLAN
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilitie...26 Jun 2009
-
Defeating Evil Twin attacks
Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why...26 Jun 2009
-
Hunting for rogue wireless devices
Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.26 Jun 2009
-
How to configure VLANs with 802.1X for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing use...26 Jun 2009
-
Security on a budget: How to control access to a WLAN
WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys,...26 Jun 2009
-
Lesson 3: How to implement secure access 2
In Lesson 3 of Wireless Security Lunchtime Learning, you'll learn the pros and cons of the various wireless access protocols so that you can choose the best method to control, authenticate and auth...26 Jun 2009
-
Cybercriminals exploit Michael Jackson, Farrah Fawcett deaths
Security researchers report malicious spam, poisoned search engine results just hours after the deaths of pop star Michael Jackson and actress Farrah Fawcett26 Jun 2009
-
Risky Business: Understanding WiFi threats
Interested in taking your enterprise wireless, or securing the wireless network you already have? Look no further. In this first of a four-part video series, Lisa Phifer of Core Competence explains...26 Jun 2009
-
802.1X Port Access Control: Which version is best for you?
Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, kno...26 Jun 2009
-
Lesson 2 quiz: From the ground up
Find out how much you learned in Lesson 2 of Wireless Security Lunchtime Learning.26 Jun 2009
-
Lesson 3 quiz: Who goes there?
Put your new knowledge of wireless access to the test.26 Jun 2009
-
A list of wireless network attacks
Get more information on wireless attacks with this article from free information security training program Wireless Security Lunchtime Learning, which references a list of attacks against 802.11 an...26 Jun 2009
Security Management Strategies for the CIO