Email Alerts
-
Is third-party software the only way to prevent access within a domain group?
Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. Ask the Expert
-
What mistakes are made when implementing enterprise IAM systems?
In this SearchSecurity.com Q&A, security expert Joel Dubin unveils the biggest mistakes made by corporations during identity and access management system implementation, and offers advice on how to avoid them. Ask the Expert
-
What are the best laptop data encryption options?
When it comes to protecting laptops and hard drives, there are plenty of choices. In this expert Q&A, Michael Cobb lays out some data protection options. And they're not just software-based, either. Ask the Expert
-
Examining DoD-level secure erasure guidelines
In this expert Q&A, platform security expert Michael Cobb explains whether DOD-level secure erasure is a doable (and necessary) procedure. Ask the Expert
-
What is the relationship between open port range and overall risk?
Exposing a large number of well-known ports could be a substantial risk, depending upon their nature. In this expert Q&A, Mike Chapple explains why it may be best to narrow down a port range. Ask the Expert
-
Compliance, data breaches heighten database security needs
Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements. Article
-
PCI Data Security Standard compliance: Setting the record straight
Helping executives understand what PCI Data Security Standard compliance is all about can be a challenge, especially when it comes to debunking the many myths that have been perpetuated over the years. Read this tip by contributor John Kindervag as h... Tip
-
EMC's RSA to acquire Tablus for data loss prevention
RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software. Article
-
Black Hat 2007: Researchers highlight new database attack method
At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers. Article
-
Investigating logic bomb attacks and their explosive effects
A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this tip from SearchSecurity.com's Ask the Expert section, Ed Skoudis explains how an enterprise can prepare for a hacker's ... Tip
Security Management Strategies for the CIO