Email Alerts
-
Secure data transmission methods
The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements. Tip
-
Layered access control: 6 top defenses that work
Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions. Tip
-
How to secure session tokens
Dos and don'ts for protecting session IDs for users of e-commerce Web sites. Tip
-
Checklist for meeting the PCI Data Security Standard
Contributor Diana Kelley summarizes the best ways to meet the PCI Data Security Standard. Tip
-
Limiting the risk and liability of federated identities
You'll learn the legal issues involved in federated identity and how to best manage them. Tip
-
Tips for securing Web-based applications
The immense popularity of Web-based applications, such as MP3 files and IM, is posing more than productivity problems for enterprises. They also make excellent attack vectors. Tip
-
Secure remote access points and configure connections to avoid a hack
This installment in our series focuses on poorly secured remote access points that can bypass firewalls and intrusion detection systems and give hackers the key to the candy store. Tip
-
Basic steps for securing Apache
In this week's tip, Mike Chapple highlights basic steps for securing an Apache server system. Tip
-
Six steps to securing your Web server
In this tip, Mike Chapple provides six simple actions you can take to make your Web server more secure. Tip
-
ASP.NET authentication: Three new options for Web services
Web developers migrating to ASP.NET find themselves faced with additional authentication options available for use in Web services. Tip
Security Management Strategies for the CIO