-
Marcus Ranum chat: Information security monitoring
Security expert and Information Security magazine columnist Marcus Ranum talks to Richard Bejtlich, CSO and vice president, Mandiant Computer Incident Response Team (MCIRT) at security firm Mandiant.31 Oct 2011
-
The lack of computer security: We’re all responsible
We all have an explanation for weak security, but everyone needs to do their part to improve it.31 Oct 2011
-
Time for discourse on China computer hacking
China is being accused of hacking corporate, government and military networks in the U.S. for economic gain. Policy makers need to be versed in cybersecurity and figure out how to respond.31 Oct 2011
-
PCI council developing point-to-point encryption certification program
PCI Security Standards Council plans to release a list of certified components in April.31 Oct 2011
-
Overcoming obstacles in the security risk assessment process
An effective risk assessment process is essential, but many factors can skew the process and get in the way of security.31 Oct 2011
-
VDI security supports active protection strategies
ISM November 2011 cover story: Eric Ogren on how virtual desktop infrastructure enhances compliance, data protection and malware protection.31 Oct 2011
-
Cybersecurity threats target lack of SMB security
Cybercriminals are zeroing in on small and midsize businesses with fewer security resources.31 Oct 2011
-
Windows vs. Mac security: An enterprise endpoint security comparison
Expert Mike Chapple explores the security implications of running Macs on the corporate network in a side-by-side comparison of Windows vs. Mac security.31 Oct 2011
-
Firefox versus IE: Which is the most secure Web browser?
Those organizations that haven’t upgraded to IE9 may consider Firefox a viable option. But is it a more secure Web browser? Michael Cobb has the answer.31 Oct 2011
-
Firefox 4 vs. Firefox 5: The risks of delaying an upgrade
Given the rapid release of new versions of Firefox, is it worth upgrading to Firefox 5 or should you wait? Expert Michael Cobb offers guidance.28 Oct 2011
-
Windows ASLR: Investing in your secure software development lifecycle
Implementing Windows ASLR can be a worthwhile investment in your enterprise’s secure software development lifecycle.27 Oct 2011
-
Open source testing tools for Web applications: Website vulnerability scanner and recon tools
Google’s open source testing tools for Web applications can save organizations money and improve the security of Web apps.27 Oct 2011
-
New Duqu Trojan analysis questions Stuxnet connection
Despite striking similarities in the Duqu kernel driver, the ultimate payloads of Duqu and Stuxnet are significantly different and unrelated, according to a report from Dell SecureWorks researchers.27 Oct 2011
-
Web application risks exacerbated by social media ties, says ISACA
Asynchronous JavaScript Technology, XML, Flash and HTML 5 enable a rich Web experience, but also give attackers an alarming number of ways to penetrate corporate networks.26 Oct 2011
-
What is a virtual directory? The essential application deployment tool
What is a virtual directory? As expert Michael Cobb explains, it can be an extremely helpful secure application deployment tool.26 Oct 2011
-
Continuous monitoring strategy for government security managers
A security expert offers insights and advice for government security managers on implementing a continuous monitoring strategy.25 Oct 2011
-
Researchers break W3C XML encryption algorithm, push for new standard
Researchers in Germany have demonstrated weaknesses in the W3C XML encryption standard used to secure websites and other Web applications.25 Oct 2011
-
How to create a problem management process flow to minimize incidents
Most organizations have an incident response team, but how many have a problem management team? Michael Cobb explains how problem management can prevent incidents.25 Oct 2011
-
NMAP NSE tutorial: Network asset and vulnerability identification
In this screencast, expert Mike McLaughlin offers an NMAP NSE tutorial for enterprise network asset and vulnerability identification.24 Oct 2011
-
Quiz: Endpoint security pitfalls to avoid
This quiz tests your ability to avoid common endpoint control pitfalls that many others have learned to hard way.24 Oct 2011
Security Management Strategies for the CIO