Email Alerts
-
Do mobile devices put sensitive data at risk when used overseas?
Any wireless electronic device is subject to eavesdropping or infection, but the risk increases dramatically when traveling to countries where a device connects to a local service provider which may be government-controlled. Ask the Expert
-
Ethical hacking techniques for standard penetration testing
Learn how to form a policy for standard penetration tests including getting written permission. Learn ethical hacking techniques. Ask the Expert
-
What vendors would you recommend for software write-blockers?
In a forensics investigation, a software write-blocker can be very helpful. But which vendors offer the best blockers? Security management expert Mike Rothman explains what to look for. Ask the Expert
-
Who has rights to patient information under HIPAA?
Under HIPAA's guidelines, it can be hard to tell who should have access to what information. So who makes the call? Security management expert Mike Rothman explains. Ask the Expert
-
My computer's serial number was reported stolen. Will I face legal repercussions?
Finding out that a laptop purchased from a computer retailer has a stolen serial number is not an every day occurence, but what is the likelihood of facing criminal charges in such a case? Ask the Expert
-
Which email encryption products can be released internationally?
In this SearchSecurity.com Q&A, application security expert Michael Cobb explains the email encryption products that can be used outside of the United States. Ask the Expert
-
Do P2P networks share the same risks as traditional ones?
Although P2P networks have their benefits, organizations still need to be careful with the peer-to-peer technology. In this SearchSecurity.com Q&A, network pro Mike Chapple explains how to protect a P2P network's many nodes. Ask the Expert
-
Is the Sarbanes-Oxley Act being enforced?
What actions are being taken to enforce the Sarbanes-Oxley Act? In this SearchSecurity.com Q&A, Mike Rothman discusses the regulations and precautions needed to ensure company compliance. Ask the Expert
-
PATRIOT Act recommendations for identifying a wireless Internet user
Ask the Expert
-
References to Carnivore in PATRIOT Act
Ask the Expert
Security Management Strategies for the CIO