Email Alerts
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Answer
-
How to secure websites using the HSTS protocol
Learn how to use HTTP Strict Transport Security (HSTS) to secure websites and how HSTS prevents man-in-the-middle attacks. Answer
-
How DHCP works and the security implications of high DHCP churn
Learn about the potential problems with high DHCP churn and whether it should be a concern to your organization. Answer
-
How MAC and HMAC use hash function encryption for authentication
Hash function encryption is the key for MAC and HMAC message authentication. See how this differs from other message authentication tools from expert Michael Cobb. Answer
-
How to set up SFTP automation for FTP/DMZ transfer
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Answer
-
SSL alternatives? Crafting Web-security programs for emerging threats
Expert Nick Lewis reacts to breaches at SSL certificate issuers and tackles whether enterprises should turn to SSL alternatives. Answer
-
Locate IP address location: How to confirm the origin of a cyberattack
What's the best way to determine the origin of a cyberattack? Expert Nick Lewis weighs in. Answer
-
IPv6 malware: With the transition, will IPv6 spam increase?
The transition from IPv4 to IPv6 could have some unintended negative consequences for security. Answer
-
How to use Wget commands and PHP cURL options for URL retrieval
When TCP or HTTP connections aren't behaving as expected, free tools like Wget and cURL can help with URL retrieval. Learn more in this expert response from Anand Sastry. Ask the Expert
-
Does Internet protocol version 6 (IPv6) make applications more secure?
Will an enterprise transitioning to IPv6 automatically make applications more secure? In this expert response, learn what an IPv6 implementation can and cannot do for application security. Ask the Expert
Security Management Strategies for the CIO