Email Alerts
-
URL shortening security best practices
Expert Michael Cobb weighs in on risks you may not know about with shortened URLs from TinyURL or Bit.ly. Answer
-
Privacy laws in the workplace: Creating employee privacy policies
Are your employees aware of their workplace privacy rights? More specifically, are they aware of what privacy rights they don't retain? Learn how to create effective employee privacy policies in this expert response. Ask the Expert
-
Information security program development: Security vs. compliance
Some enterprises can be compliant for their audits, but let security slip the rest of the time. In this expert response, Ernie Hayden explains how to get your enterprise to focus on security rather than just compliance. Ask the Expert
-
Employee information security awareness training for new IAM systems
When an enterprise gets new IAM systems, training employees on how to interact with the technology is one of the most important aspects of deployment. Learn how to implement employee information security awareness training for new IAM systems and tec... Ask the Expert
-
What defenses can prevent the hijacking of a city's fiber network?
How do you prevent a network administrator from hijacking and preventing access to a city's fiber network? The answer is fairly low-tech, says network security expert Mike Chapple. Ask the Expert
-
Can home PCs provide a way for viruses and spyware to enter a corporate LAN?
When considering allowing remote access to a corporate LAN, security concerns are paramount, especially when corporate security pros have no control over the home PCs. Learn how to protect the corporate LAN from viruses and spyware. Ask the Expert
-
I am concerned that a former employee will utilize corporate information in a malicious way.
Scenario: A former employee may still have classified enterprise information that she or he may use to hack the enterprise's system. What steps should be taken to insure the information's security? Ask the Expert
-
Is it important to hold fraud-training sessions during a fraud-risk analysis?
When conducting a fraud-risk analysis, how important is it to educate employees with fraud-training sessions? Security management expert Mike Rothman explains the best way to proceed. Ask the Expert
-
Should social engineering tests be included in penetration testing?
Information security threats expert Ed Skoudis weighs the positive and negative aspects of allowing social engineering tests to be a part of the penetration testing process. Ask the Expert
-
What kind of data is compromised during a Google hack?
Ed Skoudis defines Google hacking, unveils the type of data that is most commonly exposed during this type of attack and offers ways to ward off Google hackers. Ask the Expert
Security Management Strategies for the CIO