Email Alerts
-
Penetration testing: Helping your compliance efforts
Penetration testing can be helpful as part of a corporate vulnerability assessment, but is it as valuable for enterprise compliance? In this tip, contributor Mike Rothman examines the connection between compliance and pen-testing and unveils why pen ... Tip
-
Are open recursive DNS servers inherently insecure?
Recursion was meant to make the Internet run better, but expert Michael Cobb explains why the willingness of malicious users to abuse open recursive DNS servers has made it part of numerous ongoing threats. Ask the Expert
-
Should whole disk encryption tools be used with data backup software?
Disk encryption and disk backup play two distinct roles when it comes to enterprise network security. Michael Cobb explains how both of the important tools can be used together effectively. Ask the Expert
-
Worst practices: Learning from bad security tips
In this tip, information security threats expert Ed Skoudis exposes some bad security practices, highlights the common and dangerous misconceptions held by security personnel, and offers insight on how corporations can learn from others' mistakes. Tip
-
The ins and outs of database encryption
While pundits and gurus may say the "easy" data protection option is for an enterprise to encrypt its entire database, the truth is it's much harder than many realize. In this tip, database security expert Rich Mogull examines the two primary use cas... Tip
-
RSA attendees see data classification, rights management projects stumble
SAN FRANCISCO -- Companies need to embark on data classification projects to gain more control over its movement and minimize data leakage, but it's difficult to find a company successfully carrying out a project. Rena Mears, Deloitte's global and U.... Interview
-
Worst practices: Encryption conniptions
Through the years, SearchSecurity.com's expert contributors have no doubt spent much of their time pointing out a variety of security best practices. But what about the worst practices? In honor of April Fools' Day, network security expert Mi... Tip
-
Does FTPS encrypt data packets at the hardware or software level?
If you need to implement FTPS, which delivers a lot of data securely to a server, it might be worth investigating partial or complete hardware acceleration of the crypto-processing. Platform security expert Michael Cobb explains why. Ask the Expert
-
Is Triple DES a more secure encryption scheme than DUKPT?
Both DES and TDES use a symmetric key, but Michael Cobb explains their separate and distinct roles in protecting financial transactions. Ask the Expert
-
Should disks be encrypted at the hardware level?
Disks that automatically encrypt data as they write -- and decrypt when they read -- are appealing for a number of reasons. Platform security expert Michael Cobb explains why. Ask the Expert
Security Management Strategies for the CIO