-
Windows registry forensics: Investigating system-wide s
Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever ...
-
Screencast: How to use Nipper to create network securit
Peter Giannoulis of The Academy.ca demonstrates how to use Nipper, a free open source network infrastructure parser tool.
-
How to get information security buy-in from the executi
When pitching security to the big bosses, it's important to brush up on public-speaking skills and lay out the case in advance. Mike Rothman gives his recommendations on how to prepare for a securi...
-
Weaponizing Kaminsky's DNS discovery
The dust has settled since Dan Kaminsky revealed an intriguing -- and now, perhaps, notorious -- DNS exploit at this year's Black Hat briefings. But many organizations are still not patching their ...
-
HIPAA privacy regulations get some teeth: Be prepared
In July, a Seattle healthcare agency received a six-figure fine by the U.S. Department of Health and Human Services for compromising patient data. The penalty was the first of its kind, raising the...
-
Mining enterprise SIM logs for relevant security event
SIM products can be tremendously useful, but only if they offer information in a clear, concise manner. Given the complex nature of today's enterprise networks and the massive amount of information...
-
How to configure NAP for Windows Server 2008
The arrival of Windows Server 2008 ushers in a big portion of Microsoft's long-awaited Network Access Protection (NAP) initiative. In this tip, David Strom uses words and pictures to explain how to...
-
Exploring Microsoft's Network Access Protection policy
A policy platform was built into Microsoft Windows Vista and Windows Server 2008, one that offers the ability to create customized health policies that validate a computer's security before allowin...
-
Debian: A niche OS with a not-so-niche security flaw
A recently discovered flaw in the Debian version of Linux meant that any OpenSSL keys generated during the past 20 months could be guessed in a matter of hours. But does the vulnerability suggest b...
-
Version 1.2 of Payment Card Industry (PCI) Data Securit
Understanding the wording of the PCI Data Security Standard isn't always easy. What exactly qualifies as an "application firewall," for example, or even "strong encryption?" Thankfully, clarificati...
-
PCI version 1.2 clarifications: How to get an early sta
Last month, the PCI Security Standards Council released a preview of changes in the upcoming Payment Card Industry Data Security Standard revision. The clarifications in the standard's language are...
-
The Little Black Book of Computer Security, 2nd Edition
In an online excerpt of The Little Black Book of Computer Security, expert author Joel Dubin reviews how to prepare for today's most important compliance requirements.
-
Screencast: How to use Wikto for Web server assessment
Peter Giannoulis demonstrates what kinds of website and Web server information can be found using the free Wikto tool.
-
How to avoid DLP implementation pitfalls
Data leak prevention tools effectively reduce the chances that an enterprise's sensitive data will end up where it shouldn't, but several pitfalls can severely curtail a DLP tool's effectiveness. I...
-
Microsoft Baseline Security Analyzer: Do updates offer
The Microsoft Baseline Security Analyzer has always been useful at scanning Windows environments for the presence or absence of security updates. Now, see how the latest version adds support for Wi...
-
Security certifications: Are they worth the trouble?
Security certifications may or may not be helpful in furthering a security career, but many security pros feel they must "comply" with the unspoken expectation that certifications are a must for ca...
-
How to patch Kaminsky's DNS vulnerability
When Dan Kaminsky revealed the details of his recently discovered DNS flaw at this year's Black Hat briefings, it confirmed what many in the security community already feared: that it was one of th...
-
Web advertising exploits: Protecting Web browsers and s
Web browser exploits are nothing new, but few security managers are consciously aware of the threat that Web advertisement exploits represent.
-
How to look past information security vendor rhetoric
Security professionals are bombarded with messages from vendors (and their marketing messages) heralding sure-fire cure-alls for compliance and information security woes. So what's the best way to ...
-
Directory services and beyond: The future of LDAP
From its remarkable debut in 1993 as a directory access system, LDAP has evolved to become one of the premier directory management services, rivaled only by Active Directory. But how implementable ...
-
Three simple rules for talking compliance with execs
Expert Mike Chapple explains how to communicate the status of a corporate compliance program to the board, including both successes and shortcomings.
-
Advanced malware and threat-detection products emerge
Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge.
-
How to deploy network security devices the right way
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise.
-
Breach crisis: How to get better at intrusion detection
To solve the breach-detection issues highlighted in the 2013 Verizon DBIR, several intrusion detection techniques are needed, says expert Nick Lewis.
Security Management Strategies for the CIO