-
Is multivendor firewall management software a viable option?
Matthew Pascucci discusses the limitations of using firewall management software to manage multivendor firewalls.29 Mar 2013
-
Choosing from must-have wireless IPS features
Matthew Pascucci offers tips for choosing a wireless intrusion prevention system, including what critical features to look for.29 Mar 2013
-
Can SDN technology be used for network access protection?
Expert Matthew Pascucci discusses the possible security implications of using software-defined networking for network access protection.29 Mar 2013
-
Audit log security: How to monitor and protect audit logs
Is it possible to make audit logs tamper-proof? Expert Matthew Pascucci offers best practices for audit log security and monitoring.29 Mar 2013
-
Panel: Cyber-intelligence alone can't stop enterprise security threats
Panelists at the SANS Cyber Threat Intelligence Summit lament the challenges of using cyber-intelligence to thwart enterprise security threats.27 Mar 2013
-
Assumption of breach: How a new mindset can help protect critical data
By adopting the assumption-of-breach security model, CISOs and security pros can better protect critical data. Expert Ernie Hayden explains.27 Mar 2013
-
Huawei router security: Is there legitimate cause for concern?
Security expert Matthew Pascucci discusses Huawei router security and offers four tips for evaluating the security of enterprise network equipment.26 Mar 2013
-
Gigabit Wi-Fi: Security concerns for Cisco 802.11ac gigabit wireless
Expert Matt Pascucci discusses how the new Cisco 802.11ac wireless standard differs from others and possible security implications of gigabit Wi-Fi.26 Mar 2013
-
Determining ideal IPS throughput for new implementation
Several factors go into determining IPS throughput requirements. Expert Matt Pascucci explains in this Q&A.26 Mar 2013
-
Should syslog format be mandatory in a log management product?
Matt Pascucci discusses what to look for when evaluating a log management product and whether syslog format should be a requirement.26 Mar 2013
-
Use the Mandiant Redline memory analysis tool for threat assessments
Video: Keith Barker of CBT Nuggets shows how to use the Mandiant Redline memory analysis tool to conduct threat assessments, defeat rootkits.26 Mar 2013
-
Address IPv6 security before your time runs out
Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.25 Mar 2013
-
Botnet takedowns: A dramatic defense
The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices.25 Mar 2013
-
Why information security education isn’t making the grade
Security experts explain why a holistic approach to security is critical to training computer engineers and computer scientists for a career in information security.25 Mar 2013
-
CISOs: From no seat to multiple hats
The CISO role in many enterprises is expanding beyond security risk mitigation to risk management, privacy and regulations, and compliance.25 Mar 2013
-
Security transitions: Changes that make a difference
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.25 Mar 2013
-
The pros, cons and ROI of network malware detection
Consider the pros and cons of network malware detection when calculating ROI, says expert Matt Pascucci.25 Mar 2013
-
Choosing a switch: Should you splurge on enterprise Ethernet switches?
Matt Pascucci discusses what to look for when choosing an Ethernet switch, and whether or not to splurge on enterprise Ethernet switches.25 Mar 2013
-
Remote administration tools: How to develop a secure use policy
Matt Pascucci offers advice for developing a policy on secure use of remote management tools by network security staff.25 Mar 2013
-
What to look for in full-packet-capture and network forensic tools
Matt Pascucci explains what to look for in full-packet-capture network logging and network forensic tools, and areas to focus on during the search.25 Mar 2013
Security Management Strategies for the CIO