-
Securing big data: Architecture tips for building security in
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures.28 Jun 2012
-
How to build C-level support for the benefits of penetration testing
Matt Pascucci offers advice on how to justify the value and present the benefits of penetration testing to corporate executives.28 Jun 2012
-
Network perimeter security: How to audit remote access services
Matt Pascucci discusses the best tools to audit Internet-facing remote access services and boost network perimeter security.28 Jun 2012
-
VPN troubleshooting: Isolating VPN session timeout issues
Expert Matt Pascucci offers VPN troubleshooting advice, specifically best practices for troubleshooting VPN session timeout and lockout issues.28 Jun 2012
-
Operation High Roller: Online bank fraud
McAfee and Guardian Analytics released the findings of an investigation into a global online bank fraud ring that takes the old techniques up a notch.28 Jun 2012
-
Putting the mobile botnet threat in perspective
While lucrative mobile botnets do exist, Industry experts provide a perspective on seems to be a relatively small mobile botnet threat.28 Jun 2012
-
FBI undercover operation leads to huge online credit card fraud sting
Twenty-four people arrested across eight countries in international cybercrime takedown.26 Jun 2012
-
How to pen test: Why you need an internal security pen testing program
Learn pen testing best practices and how to build an internal pen testing team.26 Jun 2012
-
Big data security analytics: Harnessing new tools for better security
New techniques are emerging to help organizations analyze security data and improve security defenses.26 Jun 2012
-
Securing SharePoint: SharePoint security best practices
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.26 Jun 2012
-
Three steps for securing SharePoint
Restricting user permissions, server hardening and dedicated service accounts are critical.26 Jun 2012
-
Talk of cyberwarfare threats heats up with Flame malware
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.26 Jun 2012
-
Gary McGraw on mobile security: It’s all about mobile software security
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.26 Jun 2012
-
Cyberspace protection requires government collaboration with industry
Government and private sector collaboration is critical to surviving in cybespace.26 Jun 2012
-
LinkedIn password leak: Lessons to be learned from LinkedIn breach
Breach at the professional networking site highlights password practices, storage procedures.26 Jun 2012
-
Network Forensics: Tracking Hackers through Cyberspace
Authors Sherri Davidoff and Jonathan Ham discuss the benefits of Web proxies and caching for forensic analysts in this chapter excerpt from their co-authored book, Network Forensics: Tracking Hacke...26 Jun 2012
-
CISO responsibilities: Commit senior management to security governance
A CISO’s responsibilities must include convincing executives to take an active role in security governance. Expert Ernie Hayden explains how.26 Jun 2012
-
Malware detection and prevention fundamentals
Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware.26 Jun 2012
-
Password database inventory required following LinkedIn breach
Many organizations have acquired legacy applications over the years, storing password data and other information in clear text, according to one noted security expert.25 Jun 2012
-
Flame malware a lesson in nation-state hacking tactics, expert says
The Flame malware, believed to be a joint U.S.-Israeli project, shows stark differences between the tactics used by China and those used by the West.25 Jun 2012
Security Management Strategies for the CIO