Email Alerts
-
How to defend against pivot attacks in the enterprise
Nick Lewis explains what a pivot attack is and tells how to go about defending your organization against this threat. Answer
-
Secure DMZ Web server setup advice
Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS). Ask the Expert
-
How do passwordless SSH keys represent an enterprise attack vector?
Passwordless SSH keys represent an attack vector because their safety is determined by the security of the host. Learn how to protect communication between two networked devices. Ask the Expert
-
How to harden Linux operating systems
Specific advice on hardening a server depends to some extent on its intended role, says expert Michael Cobb in this SearchSecurity.com Q&A. Ask the Expert
-
How to secure SSL following new man-in-the-middle SSL attacks
Man-in-the-middle SSL attacks at Black Hat D.C. exposed a flaw in the https structure, so how can you avoid such an attack at your enterprise? Find out in Mike Chapple's expert response. Ask the Expert
-
Is it more secure to have a mainframe or a collection of servers?
The general public may think that mainframe computing is a thing of the past, but expert Michael Cobb reviews why the mainframe is still the cornerstone most large IT projects. Ask the Expert
-
How does a Web server model differ from an application server model?
A Web server model and an application server model share many similarities but require different defense methods. Each model, for example, calls for distinct placement of application servers. Ask the Expert
-
Can a hacker actually post malicious scripts to any server using a drop-down list?
By viewing a page's HTML source code and writing malicious scripts to a drop-down list, hackers may be able to re-post the malicous page to the server. In this security threats expert response, learn how to avoid this attack. Ask the Expert
-
What can be done to block adult images in search engine results?
What steps can be taken to ensure that children cannot access pornographic images through Google on their school's internet connection? Mike Rothman explains the options and the inherent difficulties. Ask the Expert
-
Server considerations for internal network application setup
Looking to offer private applications to users on an internal network? In this expert response, Mike Chapple explains why you shouldn't use the same server that provides public applications. Ask the Expert
Security Management Strategies for the CIO