Email Alerts
-
What are effective ways to stop instant messaging (IM) spam?
In this expert Q&A, Michael Cobb reveals what techniques and tools can be used to stop instant messaing spam, or spim, in the enterprise. Ask the Expert
-
Is it possible to ban chat programs on an enterprise LAN?
Chat programs can undermine enterprise security, but what's the best way to get rid of them? Application security expert Michael Cobb gives his suggestions. Ask the Expert
-
Can DHCP be used to selectively block instant messaging clients?
Restricting instant messaging use has been a significant security challenge for organizations, but will DHCP help solidfy an IM policy? In this SearchSecurity.com Q&A, Michael Cobb explains which access control mechanisms are the most effective. Ask the Expert
-
Should a rise in text message spam be expected?
According to a Ferris Research study, consumers this year are expected to receive a total of about 1 billion cell phone spam messages. Yet, compared to other countries, text message spam hasn't hit the United States very hard. In this SearchSecurity.... Ask the Expert
-
What are the risks of social networking sites?
Social networking sites allow someone to post information that thousands of other users can read. But that's not at all. In this Q&A, information security threats expert Ed Skoudis reveals how sites like Myspace and Youtube let the bad guys post some... Ask the Expert
-
How to selectively block instant messages
Monitoring instant messaging traffic isn't easy, especially when constantly evolving IM applications are designed to exploit firewall vulnerabilities. SearchSecurity.com's application security expert Michael Cobb reviews the best methods for taking o... Ask the Expert
-
How VPNs interact with instant-messaging applications
In this Ask the Expert, application security expert Michael Cobb reviews how an enterprise-wide VPN works and whether it encyrpts and protect instant-messaging communications. Ask the Expert
-
P2P availability, confidentiality and authentication vulnerabilities
Learn tactics you can employ to reduce common P2P vulnerabilities. Ask the Expert
-
How to block an unwanted IM
Application security expert Michael Cobb provides step-by-step procedures designed to show you how to block unwanted instant messages. Ask the Expert
-
The security implications of using IM through a dedicated port
Ask the Expert
Security Management Strategies for the CIO