Email Alerts
-
How DHCP works and the security implications of high DHCP churn
Learn about the potential problems with high DHCP churn and whether it should be a concern to your organization. Answer
-
How MAC and HMAC use hash function encryption for authentication
Hash function encryption is the key for MAC and HMAC message authentication. See how this differs from other message authentication tools from expert Michael Cobb. Answer
-
How to set up SFTP automation for FTP/DMZ transfer
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Answer
-
SSL alternatives? Crafting Web-security programs for emerging threats
Expert Nick Lewis reacts to breaches at SSL certificate issuers and tackles whether enterprises should turn to SSL alternatives. Answer
-
Locate IP address location: How to confirm the origin of a cyberattack
What's the best way to determine the origin of a cyberattack? Expert Nick Lewis weighs in. Answer
-
IPv6 malware: With the transition, will IPv6 spam increase?
The transition from IPv4 to IPv6 could have some unintended negative consequences for security. Answer
-
How to use Wget commands and PHP cURL options for URL retrieval
When TCP or HTTP connections aren't behaving as expected, free tools like Wget and cURL can help with URL retrieval. Learn more in this expert response from Anand Sastry. Ask the Expert
-
Does Internet protocol version 6 (IPv6) make applications more secure?
Will an enterprise transitioning to IPv6 automatically make applications more secure? In this expert response, learn what an IPv6 implementation can and cannot do for application security. Ask the Expert
-
HTTP vs. HTTPS: Is digital SSL certificate cost hurting Web security?
Learn why a digital SSL certificate could be the reason preventing many users from utilizing HTTPS. Ask the Expert
-
Is an SMTP TLS certificate the same as an FTP SSL certificate?
Are all security transportation-level certificates (TLSes) the same, or are there different certificates for different protocols? In this expert response, Randall Gamby discusses SMTP and FTP certificates. Ask the Expert
Security Management Strategies for the CIO