-
Workstation hard drive encryption: Overdue or overkill?
In an age of high-profile data breaches and insider risks, encryption is an important defense mechanism for enterprises. The question is: how much encryption is necessary? Many security pros have ...
-
Recovering stolen laptops one step at a time
When a student's laptop was stolen last year on a university campus, police and IT investigators went to work, recovering it within a matter of weeks. Neil Spellman, one of the investigators on the...
-
How to detect system management mode (SMM) rootkits
Rootkits were once a system administrator's best friend. Now they have evolved to become an admin's worst nightmare: well-known, surreptitious malware that can provide super user access to an infec...
-
Wireshark tutorial: How to sniff network traffic
One of today's most popular network security analysis tools is Wireshark. The freely available analyzer can inspect traffic, identify denial-of-service attacks and troubleshoot devices and firewall...
-
Learning the language of global compliance
When a company expands its operations to other countries, what compliance issues confront a security manager? Expert Mike Rothman explains how data security and data privacy can be the same in any ...
-
IE 8 beta 2 security features may mark improvements for
Despite Microsoft's previous best efforts to build a more secure browser, some users may have been discouraged with Internet Explorer 7. That may change now with the beta release of IE 8. Michael C...
-
User provisioning software: Emerging features reveal ma
As a fundamental feature of IAM suites, user provisioning can streamline access to multiple systems on a network. But how does user provisioning work and what features is it likely to add in the fu...
-
WEP to WPA: Wireless encryption in the wake of PCI DSS
The PCI Security Standards Council recently announced the upcoming release of PCI DSS version 1.2. Plenty of changes are on the way, but one in particular may call for some significant wireless inf...
-
Windows registry forensics: Investigating system-wide s
Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever ...
-
Screencast: How to use Nipper to create network securit
Peter Giannoulis of The Academy.ca demonstrates how to use Nipper, a free open source network infrastructure parser tool.
-
How to get information security buy-in from the executi
When pitching security to the big bosses, it's important to brush up on public-speaking skills and lay out the case in advance. Mike Rothman gives his recommendations on how to prepare for a securi...
-
Weaponizing Kaminsky's DNS discovery
The dust has settled since Dan Kaminsky revealed an intriguing -- and now, perhaps, notorious -- DNS exploit at this year's Black Hat briefings. But many organizations are still not patching their ...
-
HIPAA privacy regulations get some teeth: Be prepared
In July, a Seattle healthcare agency received a six-figure fine by the U.S. Department of Health and Human Services for compromising patient data. The penalty was the first of its kind, raising the...
-
Mining enterprise SIM logs for relevant security event
SIM products can be tremendously useful, but only if they offer information in a clear, concise manner. Given the complex nature of today's enterprise networks and the massive amount of information...
-
How to configure NAP for Windows Server 2008
The arrival of Windows Server 2008 ushers in a big portion of Microsoft's long-awaited Network Access Protection (NAP) initiative. In this tip, David Strom uses words and pictures to explain how to...
-
Exploring Microsoft's Network Access Protection policy
A policy platform was built into Microsoft Windows Vista and Windows Server 2008, one that offers the ability to create customized health policies that validate a computer's security before allowin...
-
Debian: A niche OS with a not-so-niche security flaw
A recently discovered flaw in the Debian version of Linux meant that any OpenSSL keys generated during the past 20 months could be guessed in a matter of hours. But does the vulnerability suggest b...
-
PCI version 1.2 clarifications: How to get an early sta
Last month, the PCI Security Standards Council released a preview of changes in the upcoming Payment Card Industry Data Security Standard revision. The clarifications in the standard's language are...
-
Version 1.2 of Payment Card Industry (PCI) Data Securit
Understanding the wording of the PCI Data Security Standard isn't always easy. What exactly qualifies as an "application firewall," for example, or even "strong encryption?" Thankfully, clarificati...
-
The Little Black Book of Computer Security, 2nd Edition
In an online excerpt of The Little Black Book of Computer Security, expert author Joel Dubin reviews how to prepare for today's most important compliance requirements.
-
A smarter, programmatic approach to SOX compliance
After 11 years of Sarbanes-Oxley and other mandates, enterprises have finally embraced holistic compliance program management as a best practice.
-
Next-gen firewalls improve application awareness
Learn how next-gen firewalls offer improved application awareness and granularity to manage or block particular application features.
-
Choosing the right IT security framework
Expert Joe Granneman introduces several IT security frameworks and standards, and offers advice on choosing the right one for your organization.
-
Anyka - Fotolia
The role of sandboxing in advanced malware detection
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises.
Security Management Strategies for the CIO