Email Alerts
-
What is a logic bomb?
A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. Ask the Expert
-
Are encryption products better than self-destructing data?
Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." Ask the Expert
-
What should be done with a RAID-5 array's failed drives?
Even one failed drive in a RAID-5 array can present an enterprise with serious data protection concerns. In this SearchSecurity.com Q&A, expert Michael Cobb explains which policies can protect and recover RAID-5 data. Ask the Expert
-
How secure are document scanners and other 'scan to email' appliances?
Copiers and document scanners have always posed challenges for information security teams. In this SearchSecurity.com Q&A, Michael Cobb reveals how the right policies can control the use (and abuse) of these devices. Ask the Expert
-
What are the alternatives to RC4 and symmetric cryptography systems?
In this SearchSecurity.com Q&A, network security expert Mike Chapple explains how RC4 encryption stacks up against public key cryptography. Ask the Expert
-
What are the best security practices to consider when developing a corporate blog?
Creating a corporate blog can sensitize your corporation to attacks or information theft. In this SearchSecurity.com Q&A, security expert Mike Rothman unveils the best practices to consider when developing a blog for your enterprise. Ask the Expert
-
Which Unix programs can encrypt database files?
Options may seem slim for Unix users looking to encrypt their database files. In this expert Q&A, platform security expert Michael Cobb explains whether encrypting and decrypting an entire production database is worth it to begin with. Ask the Expert
-
How to verify 140-2 (FIPS 140-2) compliance
In this SearchSecurity.com Q&A, identity management and access control expert, Joel Dubin, discuses several ways to verify that Federal Information Processing Standard 140-2 is being enforced. Ask the Expert
-
How to enforce a data destruction policy
Because of the Sarbanes-Oxley Act, intentional document destruction is now a process that must be carefully monitored. But a "document" takes on many forms, from spreadsheets and emails to instant messages and Word files. In this expert Q&A, Michael ... Ask the Expert
-
How does a privacy seal protect an ecommerce Web site?
Can a privacy seal protect your ecommerce Web site, or is it just a useful marketing tool? In this expert Q&A, identity management and access control expert Joel Dubin explains how well privacy seals actually protect a site's customer data. Ask the Expert
Security Management Strategies for the CIO