Ask the Experts
Ask the Experts
Enterprise network security
-
Network topology mapping: How to automate network documentation
Network topology mapping to boost security can be time-consuming. Learn how to automate network documentation with network management tools. Continue Reading
-
UTM devices: Efficient security or a firewall failure risk?
UTM devices provide more protection than a simple firewall, but do they increase the risk of an enterprise firewall failure? Continue Reading
-
The switch to HTTPS: Understanding the benefits and limitations
Expert Mike Cobb explains the value and limitations of HTTPS, and why making the switch to HTTPS may be easier than it seems. Continue Reading
-
Use Telnet alternative SSH to thwart Telnet security risks
The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place. Continue Reading
-
Is it possible to prevent DDoS attacks?
A distributed denial-of-service (DDoS) attack can consume all your network bandwidth. Learn how to prevent a DDoS attack in this expert response. Continue Reading
-
Can Android virtual patching thwart Android malware attacks?
Application security expert Mike Cobb weighs the pros and cons of Android virtual patching to thwart Android malware attacks. Continue Reading
-
BIOS management best practices: BIOS patches and BIOS updates
Amid growing concern over BIOS threats, expert Mike Cobb discusses how organizations should manage BIOS patches and BIOS updates. Continue Reading
-
Does Morto worm prove inherent flaws in Windows RDP security?
The recent Morto worm had unusual success spreading via Windows Remote Desktop Protocol. Does that mean RDP is security too weak? Nick Lewis explains. Continue Reading
-
Avoiding cloud bandwidth costs resulting from a cloud DDoS attack
A cloud DDoS attack on Web applications in the cloud could be expensive if it results in extra cloud bandwidth costs. Learn how to plan ahead. Continue Reading
-
An intro to free Microsoft security tools for secure software development
Free Microsoft security tools Threat Modeling, MiniFuzz and RegExFuzz are designed to help developers build secure software. Continue Reading
-
Addressing HP netbook security with webOS discontinued
A company contemplates the security implications of continuing an HP netbook rollout with webOS discontinued Continue Reading
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Continue Reading
-
Firewall network security: Thwarting sophisticated attacks
Firewall network security is still a critical part of securing an enterprise. Learn what sophisticated attacks a firewall can effectively prevent. Continue Reading
-
How to bolster BIOS security to prevent BIOS attacks
BIOS attacks can be thwarted by implementing NIST guidelines for BIOS security. Continue Reading
-
How the Google malware warning system can help minimize infections
Eventually hackers will manipulate Google’s malware warning feature, but it may help prevent future infections. Continue Reading