-
PCI compliance: Who can perform the SAQ?
Expert Mike Chapple clarifies whether a PCI Level 2 merchant can carry out an annual PCI self-assessment questionnaire.
-
How to start a network security intelligence program
Use the network and host data at your disposal to create business-focused information security intelligence policies and strategies.
-
Set up your own secure enterprise Android app store
Reduce the risk posed by smartphones and mobile applications by setting up a corporate app store for users that helps ensure Android application security.
-
SIEM technology primer
After a rocky start with early SIEM technologies, current offerings are easier to use and provide more reliable automated responses.
-
Career advice: Demand growing for security specialists
Recruiter Peter Rendall sees information security career paths leading toward security specialist jobs; SIEM, DLP and analysis are especially hot.
-
Primer: EU cookie compliance for U.S. enterprises
With recent changes to European data privacy laws, U.S. enterprises must make website changes to meet EU cookie compliance deadlines.
-
The case for integrating search, log analysis
Search is a key discipline for security log management. John Burke explains how to better search log files to improve security event log management.
-
SIEM system security: Protect the security nerve center
The prospect of a SIEM system crash should scare any enterprise. Guard against a compromised SIEM system to protect the security nerve center.
-
Perform a successful information security gap analysis
Need to assess the holes in your organization’s network? Learn how an information security gap analysis can help you find network security weaknesses.
-
How to avoid a breach by finding security 'soft spots'
How can a specialized organization spot security weaknesses? Nick Lewis offers a process to help niche companies ensure data security.
-
Carrier IQ: A big mobile security risk for enterprises?
Nick Lewis exposes the fact and fiction of the Carrier IQ software and the potential information security risk for enterprises.
-
Managed mobility services: Benefits of MDM in the cloud
Mike Chapple on dealing with the mobile device management market and what MMS can do to benefit an organization.
-
How security teams can spot high-risk employees
Expert Ernie Hayden offers a brief primer on employee risk assessment using CERT guidelines to help security teams spot high-risk employees.
-
SEC reporting rules: How to comply
Learn the public company reporting requirements necessary to comply with CF Disclosure Guidance Topic No. 2, the SEC's cybersecurity reporting rules.
-
Enterprise mobile access and two-factor authentication
Is two-factor mobile authentication the only answer to secure enterprise mobile access? Randall Gamby explores keeping mobile access under control.
-
Mac enterprise security: Going beyond Mac malware scans
More attackers see an opportunity in Mac enterprise environments. Mike Cobb explains how to ensure a Mac enterprise security plan goes beyond Mac malware scans.
-
Keys to a Windows 7 upgrade project plan
Ensure Windows 7 network security during your enterprise desktop upgrade with two essential elements for your Windows 7 upgrade project plan.
-
Exploring Google Chromebook security for the enterprise
The Chromebook is unique among new entrants in the mobile device arena. Mike Cobb breaks down the key Google Chromebook security issues enterprises need to know.
-
Exploring Android security settings and device controls
Can Androids ever be secure enough for corporate use? Learn about Android security controls to enable effective Android enterprise security.
-
Adopt Zero Trust to help secure the extended enterprise
Forrester Analyst John Kindervag explains Zero Trust Model and how it can be applied to protect data in today’s extended enterprise.
-
A smarter, programmatic approach to SOX compliance
After 11 years of Sarbanes-Oxley and other mandates, enterprises have finally embraced holistic compliance program management as a best practice.
-
Next-gen firewalls improve application awareness
Learn how next-gen firewalls offer improved application awareness and granularity to manage or block particular application features.
-
Choosing the right IT security framework
Expert Joe Granneman introduces several IT security frameworks and standards, and offers advice on choosing the right one for your organization.
-
Anyka - Fotolia
The role of sandboxing in advanced malware detection
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises.
Security Management Strategies for the CIO