-
Preventing a distributed denial-of-service attack: Is hardware needed?
Expert Matthew Pascucci suggests four key questions to ask yourself when developing distributed denial-of-service attack mitigation tactics.31 Jan 2013
-
Mobile malware and social malware: Nipping new threats in the bud
Learn mobile and social media malware prevention tactics as contributor Lisa Phifer analyzes the malware risks of social media and mobile devices.31 Jan 2013
-
Critical infrastructure security: Electric industry shows the path
Expert Brian Zimmet believes the electric industry is the one to watch for a look at the future of critical infrastructure security regulations.30 Jan 2013
-
How to implement firewall policy management with a 5-tuple firewall
Matt Pascucci explains how to implement firewall policy management for 5-tuple firewalls when ports must be kept open for business reasons.30 Jan 2013
-
Lacking privacy laws aid growing CISO role in data privacy management
More CISOs may be taking on data privacy management. Fortunately, old, outdated privacy laws may lend them a helping hand.29 Jan 2013
-
Exploring the security risks of network management outsourcing
Is network management outsourcing the future of network security or too great a risk? Matthew Pascucci discusses the risks and rewards.29 Jan 2013
-
How to utilize NDPMon for better IPv6 monitoring, network visibility
Video: Keith Barker of CBT Nuggets demonstrates NDPMon, a free, open source security tool that can improve IPv6 monitoring and network visibility.29 Jan 2013
-
Why companies still use the insecure WPA and WEP protocols
Expert Matthew Pascucci weighs in on why so many enterprises still use the insecure wireless encryption protocols -- WPA and WEP.28 Jan 2013
-
BYOD security strategies: Balancing BYOD risks and rewards
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.28 Jan 2013
-
IT Security Trends 2013: Mobile security concerns tops the list
2013 IT security trends reveal mobile device security tops the list of priorities for security pros this year.28 Jan 2013
-
The Huawei security risk: Factors to consider before buying Chinese IT
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.28 Jan 2013
-
Testing, assessment methods offer third-party software security assurance
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.28 Jan 2013
-
Offensive security involves proactive deception tactics
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.28 Jan 2013
-
Information assurance training programs create new cadre of IT security pros
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.28 Jan 2013
-
2013 Security Priority Survey, security risks when buying IT hardware from China
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, inf...28 Jan 2013
-
SearchSecurity University: Web security gateways
Learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.28 Jan 2013
-
Security school: Next-generation firewalls
This school will help enterprises build a baseline for evaluating and comparing current next-generation firewall features and offerings.24 Jan 2013
-
Red October malware attacks highlight attribution problems
The recent Red October attacks show not only a new level of complexity, but an ongoing problem with attack attribution.23 Jan 2013
-
Why SSL certificate security matters
In this Security School, you'll learn about specific methods used to exploit SSL and how to defend against them.23 Jan 2013
-
Java vulnerabilities continue to crop up with Java 7, Update 11 release
Oracle continues to encounter security issues with Java as the Java 7, Update 11 release is found to have two significant vulnerabilities.21 Jan 2013
Security Management Strategies for the CIO