Email Alerts
-
Microsoft security check: Is a Redmond Internet health check viable?
While it would be nice to check every computer for malware before allowing it on the Internet, expert Nick Lewis details why this is problematic. Answer
-
How an IIS Web application pool can help secure your enterprise
Did you know an IIS Web application pool not only helps manage your applications, but also makes them more secure? Expert Michael Cobb explains the benefits of Web application pools. Answer
-
Debug and test Web applications using Burp Proxy
The Burp Proxy tool, part of the Burp Suite, has many useful features that test Web application security. Learn how to start using Burp Proxy. Answer
-
Using a Web application honeypot to boost security for Web applications
Honeypots can be a valuable tool for logging and analyzing intrusions, but do you know the disadvantages to setting up a honeypot? Expert Michael Cobb explains some honeypot best practices. Answer
-
Using virtual test labs for virtual software testing
Do you know of virtualization that reduces your investment in hardware, space and general overhead? Virtual test labs can do just that. Expert Michael Cobb explains virtual software testing and how it can benefit your enterprise. Answer
-
How to convey the dangers of common Web application attacks
Is your enterprise management unaware of the seriousness regarding Web application attacks? Michael Cobb explains how to explain the dangers of common Web application attacks. Answer
-
What is DLL? It's more than a new and improved .EXE file
You see the term dynamic-link libraries a lot, but what is DLL and is it secure? Ask the Expert
-
Can regional banking Trojans hide from signature-based antivirus?
Signature-based antivirus is useful for detecting many different kinds of malware, but has a notoriously difficult time tracking regional malware. In this expert response, Nick Lewis explains how regional banking Trojans elude detection and what ente... Ask the Expert
-
What controls should be used to block social networking sites?
Find out what controls companies can use to block social networking sites. Ask the Expert
-
Should black-box, white-box testing be used together?
Learn why black-box, white-box testing should be used together when searching for Web application code vulnerabilities. Ask the Expert
Security Management Strategies for the CIO