-
How the JOBS Act affects SOX compliance requirements
While SMBs may benefit from the JOBS Act, Sarbanes-Oxley compliance for enterprises may remain largely unchanged. Expert Mike Chapple explains why.
-
Are enterprises unnecessarily paying for AV software?
When looking for effective enterprise antivirus software, does it matter whether it is free or paid antivirus? Yes it does, says expert Michael Cobb.
-
Addressing methods make IPv6 attacks easy for attackers
For World IPv6 Launch Day 2012, Fernando Gont covers why common ways of generating IPv6 addresses actually make an attacker’s job easier.
-
Security execs discuss value of security certifications
Do security certifications provide value and advance information security careers? Peter Rendall offers some surprising opinions from security execs.
-
MDM features vs. native mobile security
MDM features abound, but should they always trump native security features of mobile devices? Lisa Phifer discusses the pros and cons.
-
Facing the threat of SSL vulnerabilities
Recent SSL vulnerabilities have renewed questions about the protocol's security. Expert Nick Lewis covers how to implement and configure SSL securely.
-
How to prep for KPMG's HIPAA audit tidal wave
KPMG HIPAA audits will hit 150 companies this year. What if yours is one of them? Mike Chapple explains how to handle the HIPAA compliance hot seat.
-
How to protect against APT attacks
Mike Chapple offers best practices to defend your network against the latest threat to the security landscape, targeted APT attacks.
-
Are Kindle Fire, Silk browser too risky for businesses?
Do Kindle Fire security issues, combined with weak Silk browser security, make the red-hot consumer device too risky for enterprises? Michael Cobb explains.
-
The role of IAM systems in enterprise compliance
Learn about the identity management and compliance relationship and how IAM should and shouldn't support good enterprise compliance processes.
-
Exposed WPS flaw affects enterprise wireless security
The recent WPS flaw isn't just a consumer issue. Nick Lewis explains the effect on enterprise wireless security and how to avoid security issues.
-
The four vulnerable DNS components that enable attacks
DNS attack prevention demands an understanding of the four core DNS components attackers often target. Expert Char Sample explains.
-
Types of DNS attacks reveal DNS defense tactics
A thorough understanding of the types of DNS attacks, including DoS, reflector attacks and DNS cache poisoning, reveal key DNS defense tactics.
-
Will HTML5 security be better than Flash?
Will HTML5 replace Flash? Expert Michael Cobb discusses whether HTML5 security is better than Flash, and why HTML5 traffic can be harder to secure.
-
How to deal with antimalware overload
Enterprise antimalware has a way of spreading everywhere. Get Diana Kelley's advice on managing antimalware security products efficiently.
-
Planning for a DoS attack: What you need from an ISP
Expert Nick Lewis says an effective DoS attack responses demand better business continuity plans, including pre-negotiating with providers.
-
How should enterprises react to Google privacy changes?
Google’s tentacles reach deep into most enterprises, but should enterprises worry about the new Google privacy policy? Expert Michael Cobb discusses.
-
NSTIC: The future of online identity protection?
The new NSTIC identity proposal would have identity brokers handling enterprise merchant customer authentication. But can it work?
-
Testing firewalls: A three-step guide
There are three steps when testing firewalls for your organization. Expert Joel Snyder explains how to test a firewall.
-
Mitigating threats to customer-centric Web apps
New, interactive Web-facing applications are popping up all the time, but expert Nick Lewis advises enterprises on how to be vigilant against Web application threats.
-
A smarter, programmatic approach to SOX compliance
After 11 years of Sarbanes-Oxley and other mandates, enterprises have finally embraced holistic compliance program management as a best practice.
-
Next-gen firewalls improve application awareness
Learn how next-gen firewalls offer improved application awareness and granularity to manage or block particular application features.
-
Choosing the right IT security framework
Expert Joe Granneman introduces several IT security frameworks and standards, and offers advice on choosing the right one for your organization.
-
Anyka - Fotolia
The role of sandboxing in advanced malware detection
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises.
Security Management Strategies for the CIO