Email Alerts
-
The security benefits of silent updates: Timing is everything
In light of the increasing popularity of silent updates, expert Michael Cobb examines their security and application-compatibility implications. Answer
-
Does BEAST SSL tool represent an SSL threat?
Expert Nick Lewis analyzes the potential SSL threat that the BEAST SSL tool poses and discusses whether enterprises should be concerned. Answer
-
Threat of SSL malware highlights SSL security issues
Expert Nick Lewis highlights SSL security issues and the threat of SSL malware being transmitted via HTTPS. Is this a serious blow to SSL security? Answer
-
Adobe and HTML 5: Safer than Flash mobile development?
Expert Nick Lewis determines whether the combination of Adobe and HTML 5 will be safer for enterprises than Flash mobile development. Answer
-
IE automatic updates: Better security or more update fatigue?
Expert Michael Cobb deciphers the reasons behind Microsoft's new IE automatic updates. Will they combat update fatigue, or risk breaking Web apps? Answer
-
Web browser security comparison: Are Firefox security issues legit?
Expert Mike Cobb reacts to a Google-funded Web browser security comparison and whether it highlights legitimate enterprise Firefox security issues. Answer
-
Exploring Google Chrome Frame security and legacy Web applications
Can legacy Web applications benefit from the Google Chrome Frame security and interoperability capabilities? Nick Lewis gives his take. Answer
-
Explaining how trusted SSL certificates and forged SSL certificates work
Web security relies on valid, trusted SSL certificates, but as Michael Cobb explains, forged SSL certificates undermine the model for trusted Web connections. Answer
-
Dangerous applications: Time to ban Internet Explorer, Adobe in the enterprise?
CSIS says five dangerous applications are to blame for 99% of malware. Is it time to ban Internet Explorer, Flash and the others in the enterprise? Answer
-
Do WebKit exploits escalate risk of Web browser attacks?
The WebKit framework suffers from several vulnerabilities that can be exploited to conduct Web browser attacks. Expert Michael Cobb discusses the risk. Answer
Security Management Strategies for the CIO