Email Alerts
-
Have vendors secretly placed rootkits on USB thumb drives?
You can get rootkits from malicious Web sites and emails, but what about reputable vendors? Application security expert Michael Cobb explains how sneaky malware installation cost one organization a million dollars. Ask the Expert
-
Should CS2 applications be downloaded to a removable drive?
Even though U3 smart drives can execute Windows-based applications directly, the devices can introduce security risks into the enterprise. Michael Cobb lays out the pros and cons of the technology. Ask the Expert
-
Will one failed drive corrupt the rest of a RAID-5 array?
In this expert Q&A, Michael Cobb explains when it is appropriate to keep a RAID-5 array's failed drive online. Ask the Expert
-
Will an off-site employee exit procedure violate HIPAA regulations?
In this expert response, Mike Rothman discusses if it is a HIPAA violation to discuss clients or handle business matters in a public environment. Ask the Expert
-
Should an IT staff be concerned with a network's physical security?
Fifty feet outside of an office building may be a manhole that contains all the fiber that connects you to the outside world. In this expert Q&A, Mike Chapple has some advice: "Don't obsess about it." Ask the Expert
-
What are the security risks of a corporate divestiture?
Security management expert Mike Rothman discusses the data protection issues involved with a corporate divestiture . Ask the Expert
-
Can data anonymization ensure privacy of Web application user data?
There are many regulations requiring an organization to protect the personally identifiable information (PII) that it may collect. In this tip, Michael Cobb explains why it may not be too early for data anonymization techniques to help protect Web ap... Ask the Expert
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can be accessed. Ask the Expert
-
How to test an e-commerce Web site's security and privacy defenses
Assessing the security of e-commerce sites means checking up on their associated servers, databases and applications. In this expert response, Michael Cobb explains where to start. Ask the Expert
-
Should confidential data be indexed or used as the index key?
A recent attack uses a series of insert operations to find weaknesses in the database's indexing algorithm. Michael Cobb explains the nature of the threat and what it means for customer data. Ask the Expert
Security Management Strategies for the CIO