Email Alerts
-
PCI management: The case for Web application firewalls
Expert Michael Cobb lays out the compliance and security benefits of Web application firewalls. Tip
-
Vulnerability test methods for application security assessments
Learn what to do when you have a huge portfolio of potentially insecure applications, limited resources and an overwhelming sense of urgency. Tip
-
Future security threats: Enterprise attacks of 2009
Will organizations be ready for next year's enterprise security threats? Expert John Strand reviews what's in store for 2009, including new weapons, old vulnerabilities, and new takes on old attack techniques. Tip
-
How to prevent clickjacking attacks with security policy, not technology
Clickjacking, an emerging hacker technique similar to cross-site scripting, tricks a user into executing malicious commands on a seemingly legitimate or innocent website. John Strand reviews how the attack works, how it compares to cross-site-scripti... Tip
-
How to implement and enforce a social networking security policy
For a new generation of employees entering the workforce, social networking isn't a luxury, it's a necessity. Yet not all enterprises understand that failing to consider social networking security can lead to unfortunate consequences. David Sherry ex... Tip
-
New blacklists: Highly predictive or hardly worth it?
Renowned security expert Marcus Ranum once declared that blacklists were one of the most misguided ideas in computer security. But what about a new, more customized approach called highly predictive blacklists? John Strand takes a look at the emergin... Tip
-
New defenses for automated SQL injection attacks
By automating SQL injection attacks, hackers have found a way to expedite the process of finding and exploiting vulnerable websites. The old defense of testing and patching Web app code may not be enough to stop the threat. Michael Cobb explains how ... Tip
-
Stopping malware in its tracks
There's no such thing as a cure-all for stopping malware. Effective malware defense demands a keen attention to detail and careful planning. Expert Lenny Zeltser offers a malware-defense blueprint every enterprise can follow, plus plenty of free tool... Tip
-
Making the case for Web application vulnerability scanners
If a Web application scanner can find common SQL injection flaws, cross-site scripting vulnerabilities, buffer overflows and dangerous backdoors, then why aren't more enterprises using them? In this tip, Michael Cobb not only examines where the tools... Tip
-
Java security: Is it getting worse?
Some say that Java security is no longer up to snuff, suggesting that the development language is a magnet for harmful threats such as cross-site scripting and SQL injections. In this tip, security expert Joel Dubin examines the current factors affec... Tip
Security Management Strategies for the CIO