Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Dynamic code obfuscation: New threat requires innovative defenses
Dynamic code obfuscation used to be a taxing effort, but now even the most junior-level malicious hackers have learned how to effectively hide their code. In this tip, Michael Cobb examines how dynamic code obfuscation works, why it's on the rise ... Continue Reading
Product review: e-DMZ Security's eGuardPost
This product review examines e-DMZ eGuardPost's capabilities that allow security managers to apply granular access controls to remote connections. The appliance also comes bundled with Security's Password Auto Repository (PAR), e-DMZ's flagship ... Continue Reading
DigitalPersona Workstation Pro and Server for Biometric Authentication
This review evaluates DigitalPersona Pro, a single sign-on (SSO) software suite that allows an enterprise to replace passwords with biometric fingerprint readers or provide dual-factor authentication. Continue Reading
-
Enterprise UTM products differ from all-in-one SMB appliances
UTM appliance struggle to find their niche in the enterprise as large companies prefer best-in-breed security products. Continue Reading
Windows Vista: Security issues to consider
Windows Vista is now in the wild. With its myriad new security features, are enterprises foolish not to adopt right away? In this tip, contributor Michael Cobb examines the security-related pros and cons of Microsoft's latest operating system and ... Continue Reading
What causes buffer overflows and memory leaks in a Web application?
Buffer overflows and memory leaks can cause serious harm to Web applications. In this SearchSecurity.com Q&A, application security expert Michael Cobb reveals how both can lead to security breaches and system compromises.Continue Reading
Should full disk encryption be used to prevent data loss?
According to a Ponemon Institute survey done in August 2006, eighty-one percent of companies reported the loss of one or more laptops during a 12 month period. In this SearchSecurity.com Q&A, platform security Michael Cobb explains whether that ...Continue Reading
How should security and networking groups manage the firewall?
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should these responsibilities be split? In this expert Q&A, security management pro Shon Harris reveals how ...Continue Reading
Cyber-Ark Enterprise Password Vault 4.0 product review
Product review of Cyber-Ark Enterprise Password Vault, a password management and security tool that manages passwords and controls privileged accounts.Continue Reading
Information security blueprint for architecture and systems
A formalized security architecture diagrams how you should handle the changing threat and regulatory environments.Continue Reading
-
Using IAM, password and provisioning management tools for compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes.Continue Reading
Using role management in provisioning and compliance
Role management provides the necessary framework for enterprises to efficiently govern access to sensitive data based on workers' jobs. However, many organizations fail to rescind unnecessary access privileges when employees change roles. In this ...Continue Reading
Is Sender ID an effective email authentication tool?
Sender ID, used by five million domains, can significantly counter spammers and phishers, but is it the best antispam technology? In this expert Q&A, Michael Cobb reveals the pros and cons of the email authentication framework.Continue Reading
Do XPath injection attacks require the same response as SQL injections?
XPath injection attacks are slightly different (and more dangerous) than SQL injections. In this SearchSecurity.com Q&A, application expert Michael Cobb reveals the preventative steps that can protect your systems from either type of assault.Continue Reading
What are application logic attacks?
In 2005, application logic flaws allowed alert, Web-savvy gamblers the chance to win a lot of money. In this SearchSecurity.com tip, application security expert Michael Cobb examines these types of vulnerabilities and how they can lead to ...Continue Reading
Will two different operating systems cause administrative problems?
Using two different operating systems can often boost a company's security, but there are practical limitations to the enterprise practice. In this expert Q&A, Michael Cobb reveals how separate platforms can lead to deployment issues and higher ...Continue Reading
How can rootkit hypervisors affect operating system security?
What can rookit hypervisors do to your operating system? "Whatever their creators want!" says application security expert Michael Cobb. In this SearchSecurity.com Q&A, Cobb explains how rootkit hypervisors could defeat the security defenses of a ...Continue Reading
Virtual Threats
Virtual machines save you money in the data center, but can you ignore their security implications any longer?Continue Reading
Core Security Technologies Core Impact 6.0 security tool review
In this product review, learn how Core Security Core Impact 6.0 tool can assist in ethical hacking a penetration testing, and get info on setup, reporting and management.Continue Reading
How to setup and configure syslog to view and filter data
Your network devices are trying to tell you that you're under atta ck. Syslog helps you sort through the data overload and get the message.Continue Reading
Using steganography for securing data, not concealing it
Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ensure the practice isn't used maliciously.Continue Reading
Who should manage the firewall?
Maintaining a firewall is not an easy task, especially when business rules narrowly define which tasks should be performed by network administrators and which should be handled by information security practitioners. To make life easier, some ...Continue Reading
Access control management strategy essentials
In our expert Q&A, Joel Dubin reviews essential components of an access management strategy and reveals how to deliver the plan to executives.Continue Reading
How do local identity, SSO and federated identity management models differ?
In many organizations, users have several applications that they need to log on to, each requiring distinct user IDs and passwords. In our expert Q&A, Joel Dubin explains how federated identity management and single sign-on can provide convenient ...Continue Reading
When choosing a digital certificate, how important is the expiration period?
In this expert Q&A, application security pro Michael Cobb helps you plan your digital certificate policy. Cobb emphasizes the importance of keeping your Web server certificates up-to-date.Continue Reading
Intrusion Detection: Lancope StealthWatch 5.5
Lancope's Lancope StealthWatch 5.5Continue Reading
For asset management systems, is there a tool more comprehensive than Nmap?
If you're looking for a network discovery tool, consider Nmap. There are other options for your asset management system, however, and Michael Cobb reviews them in this expert Q&A.Continue Reading
Which Internet protocol is more secure: FTPS or SCP?
In this expert Q&A, Michael Cobb reviews the strengths and weaknesses of various Internet protocols. Learn the pros and cons of FTPS, SCP and SFTP.Continue Reading
How simple steps ensure database security
An enterprise database stores an organization's most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate ...Continue Reading
Intrusion Detection: Arbor Networks' Peakflow X 3.6
Arbor Networks' Peakflow X 3.6Continue Reading
Optical network security: Inside a fiber-optic hack
Fiber-optic networks aren't hack-proof: A savvy attacker can crack them with ease.Continue Reading
What tools are available to verify a patch's validity?
Ever wonder about the source and integrity of a downloaded patch? In our expert Q&A, platform security expert, Michael Cobb, tells users about various management programs that can verify your patches.Continue Reading
How to secure an e-commerce Web site
If you need to secure an e-commerce Web site, application security expert, Michael Cobb, has a place to start. In this expert Q&A, Cobb recommends the equipment that will secure your online business.Continue Reading
If email attachments are sent via SSL will they be encrypted?
This application security Ask the Expert Q&A explains what happens to traffic that travels over an SSL connection and details how to keep email messages and attachments secure as they travel to and from email clients and SMTP servers.Continue Reading
Security Blog Log: Taking Google Code Search for a spin
This week, the blogosphere is buzzing about Google Code Search. Despite concerns that the tool will aid attackers, some see it as a boost for security.Continue Reading
What is the average cost of an MSSP?
Looking to find the startup and maintenance costs of an MSSP? In this Ask the Expert Q&A, application security expert, Michael Cobb outlines the key issues for businesses to consider when examining managed security arrangements.Continue Reading
managed security services (MSS)
Managed security services (MSS) is a systematic approach to managing an organization's security needs.Continue Reading
Nmap and the open source debate
Upper management may be hesitant to approve the use of an open source tool, but Nmap has many benefits. This tip offers selling points to present to upper management when proposing the use of Nmap.Continue Reading
What components should an application security management system (ASMS) have?
Is there one product that will solve all of your ASMS needs? Maybe not, but Identity Management and Access Control expert Joel Dubin reviews the three components that should be included in any application security management system, in this Ask the...Continue Reading
Authentication: MXI Security's Stealth MXP
MXI Security's Stealth MXPContinue Reading
Nmap parsers and interfaces
SearchSecurity expert contributor Michael Cobb continues his series on Nmap with a detailed look at Nmap parsers and interfaces.Continue Reading
Can email header information be used to track down spoofers?
Expert Mike Cobb explains how to use your received headers to trace unwanted emails.Continue Reading
How to selectively block instant messages
Monitoring instant messaging traffic isn't easy, especially when constantly evolving IM applications are designed to exploit firewall vulnerabilities. SearchSecurity.com's application security expert Michael Cobb reviews the best methods for taking ...Continue Reading
The strengths and weaknesses of PKI and PGP systems
PKI and OpenPGP can enhance the security of your data, but these services differ in how they manage digital certificates. SearchSecurity.com expert Michael Cobb explains the distinct strengths and weaknesses of each program.Continue Reading
One-time password tokens: Best practices for two-factor authentication
In this tip, Joel Dubin examines how to physically secure one-time password tokens and how to properly implement them to provide effective two-factor authentication.Continue Reading
Ajax security: How to prevent exploits in five steps
While Ajax can make your Web pages feel faster and more responsive, this Internet-based service, like many Web development tools, has its security concerns. In this tip, SearchSecurity.com expert Michael Cobb examines how Ajax works, how hackers can...Continue Reading
Interpreting and acting on Nmap scan results
As we continue our series on Nmap in the enterprise, SearchSecurity expert contributor Michael Cobb explains how to run some of the more regular Nmap scans.Continue Reading
Data Encryption and IDS / IPS: Getting a better view of network activity
Encryption can to help secure data and meet HIPPA requirements, but the technology blocks sight of network activity by blinding IDSes and IPSes. Learn how to have an effective encryption and IDS/IPSe solution simultaneously.Continue Reading
Risk management: Implementation of baseline controls
This fourth article in the Insider Threat Management Guide examines the implementation of baseline controls.Continue Reading
Risk management references
References for our Insider Threat Management Guide.Continue Reading
Risk management: Baseline management and control
Identifying baseline controls is the second step to implementing insider threat controls as described in this article from SearchSecurity's Insider Threat Management Guide.Continue Reading
Identity and access management final exam
Find out how much you learned in Identity and Access Management Security School and the areas where you need to focus more attention.Continue Reading
Techniques for improving Nmap port scan times
As we continue our series on using Nmap in the enterprise, SearchSecurity expert Michael Cobb provides commands that will help you adjust your Nmap scan times appropriately -- whether you want Nmap to run slow and quietly, fast and furious, or ...Continue Reading
The pros and cons of data wiping
Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Platform Security Ask the Expert Q&AContinue Reading
How to create an optional login for the same application
In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to create optional logins for your applications.Continue Reading
Secure Reads: Steganography and the art of covert communication
Read a quick review of the book, Hiding in Plain Sight: Steganography and the Art of Covert Communication.Continue Reading
IDP/Network Access Control
ForeScout Technologies' CounterACTContinue Reading
Nmap: Firewall configuration testing
This tip, in our Nmap manual series, explains how Nmap can be used to test the effectiveness of a firewall configuration. Learn how to use the open source network mapper to better understand how your firewall handles uninvited traffic and to test ...Continue Reading
Identity and Access Management Services, Systems and Technologies
Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores ...Continue Reading
Five freeware tools for mitigating network vulnerabilities
From Nmap to Snort, there are a variety of viable freeware tools available for information security professionals. In this tip, Michael Cobb reviews five freeware tools and explains why he believes they are the best tools in their space.Continue Reading
How to configure and implement a DMZ
Learn how to design and configure a DMZ in this network security Ask the Expert Q&A.Continue Reading
Information security resume do's and don'ts
Get advice, and learn do's and don'ts for creating an information security technology or network security resume.Continue Reading
Career management 101 for information security pros
Eight questions to help information security professionals determine if their career is on the right track.Continue Reading
Nmap: More port scanning techniques
In this fifth tip in our Nmap manual, SearchSecurity.com expert Michael Cobb looks at some of the Nmap port scanning techniques that exploit certain idiosyncrasies of specific platforms or protocols in order to better differentiate between open and ...Continue Reading
How to configure a server to prevent unauthorized network access
Learn from other security practitioners as they share ways to configure a network so unauthorized users cannot access files, folders and other sensitive information.Continue Reading
PIX firewall configuration from scratch
Learn how to configure passwords, IP addresses, network address translation (NAT) and basic firewall rules in this tip.Continue Reading
Nmap: How to scan ports and services
Nmap is the ideal tool for performing a simple network inventory or vulnerability assessment. This article offers tips on how to use a NmapContinue Reading
Are there any patch management products that track the patching process?
Before you dip into your IT budget to solve your patching problems, read this Q&A. Our platform security expert examines why security pros should consider using available freeware products to track and manage their patching process.Continue Reading
Use SHA to encrypt sensitive data
Complying with the PCI Data Security Standard is now on the forefront of many security practitioner's minds. Learn how using the Secure Hashing Algorithm can help you encrypt sensitive data and help you meet the PCI Data Security Standard ...Continue Reading
Policy management: Manual vs. automated tools
Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync.Continue Reading
How to install and configure Nmap on Linux
Get tips on how to install and configure Nmap on Linux in an enterprise network environment.Continue Reading
Alphabet soup: Understanding standards for risk management and compliance
This article makes sense of the soupy mix of standards by taking a closer look at the various methodologies and frameworks, and examining what each has to offer.Continue Reading
Preventing blind SQL injection attacks
Most security professionals know what SQL injection attacks are and how to protect their Web applications against them. But, they may not know that their preventative measures may be leaving their applications open to blind SQL injection attacks. ...Continue Reading
Intrusion Prevention: McAfee's IntruShield 3000
McAfee's IntruShield 3000Continue Reading
Hot Pick: BlueCat Networks' Adonis 1000
BlueCat Networks' Adonis 1000Continue Reading
IIS security: Configure Web server permissions for better access control
Updating user access controls as business portfolios expand can help protect confidential data. Learn how to secure user access controls and keep your greatest asset under lock and key by configuring IIS Web server permissions, in this tip by ...Continue Reading
How to install and configure Nmap for Windows
In this second installment of our Nmap Technical Manual, SearchSecurity expert Michael Cobb offers pointers on how to install and configure Nmap for Windows.Continue Reading
Nmap: A valuable open source tool for network security
Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping, port-scanning and testing for network vulnerabilities.Continue Reading
Swiping Back
INDUSTRY COMPLIANCE With the goal of reducing fraud, the credit card associations' PCI standard scores points for clarity.Continue Reading
HTTP attacks: Strategies for prevention
Examine how hackers manipulate HTTP requests to solicit an attack, and learn various guidelines developers should follow to mitigate this threat.Continue Reading
How to implement an effective risk management team
In this installment of the Risk Management Guide, Shon Harris describes the roles and responsibilities of an information risk management team.Continue Reading
Information risk management: Defining the scope, methodology and tools
In this installment of the Risk Management Guide, Shon Harris explains the importance of defining the scope of the IRM team's responsibilities, the difference between qualitative and quantitative risk analysis and the tools used to carry out risk ...Continue Reading
Biometrics: Best practices, future trends
Biometrics products are improving, but they still require careful consideration and planning before implementation. In this tip, ID and access management expert Joel Dubin reviews some best practices and pitfalls to watch out for.Continue Reading
How to write an information risk management policy
In this installment of the Risk Management Guide, Shon Harris describes the contents of a risk management policy and provides a sample policy template.Continue Reading
Patch management quiz answers
Best practices for pen testing Web applications
Performing a Web application penetration test can gauge how well your Web application can withstand an attack. In this tip, platform security expert Michael Cobb provides best practices for performing Web application pen test.Continue Reading
State-based attacks: Session management
In this excerpt from Chapter 4 of "How to Break Web Software: Functional and Security Testing of Web Applications and Web Services," authors Mike Andrews and James A. Whittaker identify session management techniques Web developers should use to ...Continue Reading
Google Hacking: Why being a Google dork is hurting your company
Are you a Google dork? A simple Google search engine query can expose corporate security secrets and private information. Black hats are aware of it. Are you? Learn how to prevent and defend against Google hacking.Continue Reading
Application development best practices
Michael Cobb, SearchSecurity.com's application security expert, discusses best practices for specific application development procedures in this Ask the Expert Q&A.Continue Reading
Patch management techniques
In this Ask the Expert Q&A, our platform security expert provides techniques to use when testing, installing and deploying a patch to your network.Continue Reading
How e-mail message components are used
Learn what happens when someone's e-mail address differs from the certificate e-mail field value, in this application security Ask the Expert Q&A.Continue Reading
How VPNs interact with instant-messaging applications
In this Ask the Expert, application security expert Michael Cobb reviews how an enterprise-wide VPN works and whether it encyrpts and protect instant-messaging communications.Continue Reading
The pros and cons of proxy firewalls
In this Ask the Expert Q&A, our application security expert reviews the pros and cons of proxy firewalls.Continue Reading
What's new in the revision of ISO 17799
SearchSecurity expert Michael Cobb outlines the latest changes to the ISO 17799 standard.Continue Reading
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.Continue Reading
Step 6: Managing and tracking compliance
Cheat sheet: Access management solutions and their pros and cons
A cheat sheet of the most common access solutions with a brief description, and their risks and pros and cons to help you choose the solution that is right for your organization.Continue Reading
Risk Management
Executive Security Management
An overview of the risk management process
In this installment of the Risk Management Guide, Shon Harris provides a 10,000-foot view of the risk management process.Continue Reading