Email Alerts
-
Manage access to social networking sites with an acceptable use policy
Social networking sites can cause security issues, but sites like Twitter and Facebook can also open up significant business opportunities. Learn how to manage employee access to social networking sites to make sure only those employees who need acce... Ask the Expert
-
IT business justification to limit network access
Are you hoping to limit network access at your organization, but aren't sure how to go about creating an IT business justification for a proxy server? In this expert response, Randall Gamby explains what a proxy server can do, including how to explai... Ask the Expert
-
How to confirm the receipt of an email with security protocols
Many websites try to ensure secure registrations by sending email confirmations. But how is it possible to confirm receipt of that email by the correct recipient? Identity and access management expert Randall Gamby weighs in. Ask the Expert
-
Can mutual authentication beat phishing or man-in-the-middle attacks?
What's the best way to prevent phishing and man-in-the-middle attacks? IAM expert David Griffeth explains the benefits of mutual authentication over one-way SSL. Ask the Expert
-
Could someone place a rootkit on an internal network through a router?
If a hacker gains control of a router and then uploads a new configuration opening ports up for communication, it may be possible to place a rootkit on the internal network. In this IAM expert response, learn how this attack might happen, and how to ... Ask the Expert
-
Should a new user have to confirm an email address to gain access?
'Authenticate new user' emails can be helpful tools in preventing spammers from creating a million users that will flood a site. Identity and access management expert Joel Dubin gives advice. Ask the Expert
-
Users can no longer reach any Microsoft login site. Any ideas?
When users can no longer access certain websites, a proxy is most likely the cause. In this identlty and access management expert response, learn best practices for managing such proxies. Ask the Expert
-
What are the risks of connecting a Web service to an external system via SSL?
Security pro Joel Dubin discusses the risks associated with SSL connections, and offers advice on how to avoid them. Ask the Expert
-
CardSpace vs. user IDs and passwords
Identity management and access control expert Joel Dubin discusses the pros and cons of using Cardspace, and how it compares to using a common password system. Ask the Expert
-
Preventing employees from using a proxy to visit blocked sites
P2P blocking can be difficult; smart blocking tools can help. Answer
Security Management Strategies for the CIO