Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
If a virtual machine is hacked, what are the consequences?
In our expert Q&A, information security threats expert Ed Skoudis explains how attackers can compromise a virtual machine. Continue Reading
Access control management strategy essentials
In our expert Q&A, Joel Dubin reviews essential components of an access management strategy and reveals how to deliver the plan to executives. Continue Reading
What are the criteria for a strong authentication system?
In this Q&A, identity management and access control expert, Joel Dubin examines what components are necessary to create any secure authentication system. Continue Reading
-
How do local identity, SSO and federated identity management models differ?
In many organizations, users have several applications that they need to log on to, each requiring distinct user IDs and passwords. In our expert Q&A, Joel Dubin explains how federated identity management and single sign-on can provide convenient ... Continue Reading
When choosing a digital certificate, how important is the expiration period?
In this expert Q&A, application security pro Michael Cobb helps you plan your digital certificate policy. Cobb emphasizes the importance of keeping your Web server certificates up-to-date. Continue Reading
For asset management systems, is there a tool more comprehensive than Nmap?
If you're looking for a network discovery tool, consider Nmap. There are other options for your asset management system, however, and Michael Cobb reviews them in this expert Q&A.Continue Reading
Which Internet protocol is more secure: FTPS or SCP?
In this expert Q&A, Michael Cobb reviews the strengths and weaknesses of various Internet protocols. Learn the pros and cons of FTPS, SCP and SFTP.Continue Reading
RFID security issues endanger companies and consumers
As the holiday season approaches, credit card purchases will undoubtedly increase. However, before waving your RFID-enabled credit card at the checkout of your favorite store, research suggests you may want to think twice. In this tip, Joel Dubin ...Continue Reading
Developing an information security program using SABSA, ISO 17799
In this final article of our information security governance series, Shon Harris explains how to develop an information security program with SABSA and ISO 17799.Continue Reading
How simple steps ensure database security
An enterprise database stores an organization's most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate ...Continue Reading
-
VPN or RPC/HTTPS? Both have their place
Some security practitioners may debate which access method is best for ensuring secure, remote access to Exchange, but as Lee Benjamin explains, both VPNs and RPC over HTTPS can be effective strategies, depending on an organization's needs.Continue Reading
Should an organization centralize its information security division?
Is your organization capable of having true information security governance? In our expert Q&A, Shon Harris reveals the ideal components of a centralized security team.Continue Reading
What are the best options for handling segregation of duties?
In this expert Q&A, security management expert Shon Harris explains the benefits to a separation of duties and reveals the best ways to implement tight access control within your enterprise.Continue Reading
Steps in the information security program life cycle
This article from our series on information security governance describes the essential steps to take when developing a security program life cycle.Continue Reading
What is the risk estimation model for SSL VPN implementation?
Risk assessment is a common way to evaluate new technologies. In our SearchSecurity.com Q&A, network security expert, Mike Chapple, explains how to determine if SSL VPN implementation is right for your organization.Continue Reading
What tools are available to verify a patch's validity?
Ever wonder about the source and integrity of a downloaded patch? In our expert Q&A, platform security expert, Michael Cobb, tells users about various management programs that can verify your patches.Continue Reading
Privacy and your offshore operations
Most companies are used to considering the implications of Sarbanes-Oxley and Gramm-Leach-Bliley on their domestic operations, but thinking about security and privacy offshore is just as important. Contributor Joel Dubin explains how to ensure ...Continue Reading
What is the cause of a wireless LAN's unsecured connection?
In our expert Q & A, network security expert, Mike Chapple, reveals the reason behind your wireless LAN's "unsecured connection."Continue Reading
If email attachments are sent via SSL will they be encrypted?
This application security Ask the Expert Q&A explains what happens to traffic that travels over an SSL connection and details how to keep email messages and attachments secure as they travel to and from email clients and SMTP servers.Continue Reading
What is the average cost of an MSSP?
Looking to find the startup and maintenance costs of an MSSP? In this Ask the Expert Q&A, application security expert, Michael Cobb outlines the key issues for businesses to consider when examining managed security arrangements.Continue Reading
Nmap and the open source debate
Upper management may be hesitant to approve the use of an open source tool, but Nmap has many benefits. This tip offers selling points to present to upper management when proposing the use of Nmap.Continue Reading
What components should an application security management system (ASMS) have?
Is there one product that will solve all of your ASMS needs? Maybe not, but Identity Management and Access Control expert Joel Dubin reviews the three components that should be included in any application security management system, in this Ask the...Continue Reading
What is the best authentication method for protecting an online banking site?
Two-factor authentication isn't bulletproof. SearchSecurity.com's Identity Management and Access Control expert Joel Dubin, reviews authentication possibilities for an e-commerce site and examines the risks involved with one time password tokens, ...Continue Reading
How to safely issue passwords to new users
In this Ask the Expert Q&A, our identity management and access control expert Joel Dubin offers tips on safe password distribution, and reviews the common mistakes that help desks and system administrators make when issuing new passwords.Continue Reading
What are the best authentication tools for locking down a laptop?
Stolen laptops continue to be a troublesome issue for businesses. In this Identity Management and Access Control Ask the Expert Q&A, Joel Dubin reviews the best available authentication and encryption tools for securing company laptops.Continue Reading
Key elements when building an information security program
Discover how to achieve information security governance by learning the essential elements behind a sucessful security program.Continue Reading
How do L2TP and PPTP differ from IPsec?
There are different protocol options when setting up a VPN tunnel. SearchSecurity.com expert Mike Chapple reviews the choices and reveals the one that is most secure.Continue Reading
How can I prevent spammers from populating my mailing list?
SearchSecurity.com's information security threats expert, Ed Skoudis, explains the workings of a spambot and teaches the strategies you need to counter spammers and clean up your mailing lists.Continue Reading
Nmap parsers and interfaces
SearchSecurity expert contributor Michael Cobb continues his series on Nmap with a detailed look at Nmap parsers and interfaces.Continue Reading
Can email header information be used to track down spoofers?
Expert Mike Cobb explains how to use your received headers to trace unwanted emails.Continue Reading
What types of Web services can compromise Web server security?
SearchSecurity.com expert Michael Chapple reveals how a service overload can leave your system open to attacks.Continue Reading
How to selectively block instant messages
Monitoring instant messaging traffic isn't easy, especially when constantly evolving IM applications are designed to exploit firewall vulnerabilities. SearchSecurity.com's application security expert Michael Cobb reviews the best methods for taking ...Continue Reading
Can laptop users' offline activities be monitored?
There is a direct solution for enterprises looking to enforce a "no USB devices" policy. SearchSecurity.com's network security expert Michael Chapple provides the answer and explains how an enterprise can monitor laptop users' offline activities.Continue Reading
The strengths and weaknesses of PKI and PGP systems
PKI and OpenPGP can enhance the security of your data, but these services differ in how they manage digital certificates. SearchSecurity.com expert Michael Cobb explains the distinct strengths and weaknesses of each program.Continue Reading
Logwatch: Taking the pain out of log analysis
This column reviews the benefits of Logwatch, an open source security log analysis tool.Continue Reading
One-time password tokens: Best practices for two-factor authentication
In this tip, Joel Dubin examines how to physically secure one-time password tokens and how to properly implement them to provide effective two-factor authentication.Continue Reading
Ajax security: How to prevent exploits in five steps
While Ajax can make your Web pages feel faster and more responsive, this Internet-based service, like many Web development tools, has its security concerns. In this tip, SearchSecurity.com expert Michael Cobb examines how Ajax works, how hackers can...Continue Reading
Interpreting and acting on Nmap scan results
As we continue our series on Nmap in the enterprise, SearchSecurity expert contributor Michael Cobb explains how to run some of the more regular Nmap scans.Continue Reading
Which public key algorithm is used for encrypting emails?
Although PGP and S/MME both use public key encryption, Expert Joel Dubin explains PGP and S/MME's distinct approaches to e-mail coding.Continue Reading
What are the top five high risk areas in a network operations environment?
Although continuity plans, encryptions, and change controls are important security concerns within an organization, they are only some of the components that make up a successful security-integrated business program. Expert Shon Harris explains.Continue Reading
How can I protect the sensitive information that resides on my laptop?
Learn how to safeguard data that resides in your laptop in this Network Security Ask the Expert Q&A.Continue Reading
Mitigate botnets in five steps
Don't let bots provide back door access to your computing environment. In this tip, Tony Bradley reveals the evolution of bot code, and strategies to mitigate the botnet threat.Continue Reading
What are the security risks associated with virtual PCs?
Since Virtual PCs enable you to run multiple operating systems simultaneously on a single piece of hardware, they can introduce risks into your networking environment. In this information security threats Q&A, Ed Skoudis examines what these risks ...Continue Reading
How to prevent input validation attacks
Learn what canonicalization is and what Web developers can do to prevent input validation attacks.Continue Reading
Four ways to isolate sensitive servers
When the security issue arises, a discussion of isolating a sensitive server usually follows. While often impractical, learn four ways to isolate sensitive servers if the need becomes a necessity.Continue Reading
How to create shared services that two different parties can use
To mitigate a problem common to educational facilities, the student hacker, network security expert Mike Chapple suggests isolating student and administrative networks or creating shared services that both parties can use. Learn how to accomplish ...Continue Reading
How does single sign-on affect compliance efforts?
In this Identity Management and Access Control Ask the Expert Q&A, resident Joel Dubin examines how using single sign-on influences enterrprise-wide compliance efforts.Continue Reading
Network access control: Compliance enabler or detractor?
No one technology is a regulatory compliance cure-all, but network access control (NAC) does have its benefits. In this article from Identity and Access Management Security School, guest instructor Mike Rothman outlines the pros and cons of ...Continue Reading
Techniques for improving Nmap port scan times
As we continue our series on using Nmap in the enterprise, SearchSecurity expert Michael Cobb provides commands that will help you adjust your Nmap scan times appropriately -- whether you want Nmap to run slow and quietly, fast and furious, or ...Continue Reading
Telecommuting security: Protecting sensitive data inside and out
The rash of laptop thefts in recent months has brought telecommuting and remote access security to the forefront of many information security professionals' minds. In this tip, Joel Dubin examines the mistakes made in the VA data theft case and ...Continue Reading
The pros and cons of data wiping
Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Platform Security Ask the Expert Q&AContinue Reading
How to create an optional login for the same application
In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to create optional logins for your applications.Continue Reading
CRLF injection attacks: How they work and what to do about them
CRLF injection attacks may not be as popular as other application attacks, but they can be just as devastating. Learn how CRLF injection attacks are executed and how to defend your organization against these attacks.Continue Reading
Nmap: Firewall configuration testing
This tip, in our Nmap manual series, explains how Nmap can be used to test the effectiveness of a firewall configuration. Learn how to use the open source network mapper to better understand how your firewall handles uninvited traffic and to test ...Continue Reading
Email filtering tools and techniques
Email filtering tools help organizations enforce acceptable use policies, filtering office email and blocking personal email traveling over the corporate network. This tip introduces the two classes of email filtering tools and how to choose the one...Continue Reading
Utilizing Active Directory to automate provisioning
This article focuses on utilizing Active Directory and Group Policy to automate provisioning.Continue Reading
Five freeware tools for mitigating network vulnerabilities
From Nmap to Snort, there are a variety of viable freeware tools available for information security professionals. In this tip, Michael Cobb reviews five freeware tools and explains why he believes they are the best tools in their space.Continue Reading
How to configure and implement a DMZ
Learn how to design and configure a DMZ in this network security Ask the Expert Q&A.Continue Reading
How do circuit-level gateways and application-level gateways differ?
Learn how circuit-level gateways and application-level gateways differ in this network security Q&A.Continue Reading
How do proxy servers and proxy firewalls differ?
In this network security Ask the Expert Q&A, SearchSecurity's resident expert Mike Chapple examines how proxy servers and proxy firewalls differ and explains how they work together.Continue Reading
Shareware applications vs. commercial software
Considering using a shareware application? In this information security threats Ask the Expert Q&A, SearchSecurity's resident expert Ed Skoudis examines if commercial software product are more secure than shareware applications.Continue Reading
Phishing vs. Pharming attacks
Learn how phishing attacks differ from pharming attacks and whether or not pharming attacks still threaten, in this information security threat Ask the Expert Q&A.Continue Reading
Should we use biometric authentication devices?
Are more companies using biometrics? SearchSecurity's resident identity management and access control expert tackles this question and reviews five fundamental barriers that may limit the growth of biometric authentication.Continue Reading
Risk-based authentication vs. static authentication
How does risk-based authentication methods differ from static authentication methods? SearchSecurity's resident identity management and access control expert tackles this question in this Ask the Expert Q&A.Continue Reading
Nmap: More port scanning techniques
In this fifth tip in our Nmap manual, SearchSecurity.com expert Michael Cobb looks at some of the Nmap port scanning techniques that exploit certain idiosyncrasies of specific platforms or protocols in order to better differentiate between open and ...Continue Reading
How to configure a server to prevent unauthorized network access
Learn from other security practitioners as they share ways to configure a network so unauthorized users cannot access files, folders and other sensitive information.Continue Reading
PIX firewall configuration from scratch
Learn how to configure passwords, IP addresses, network address translation (NAT) and basic firewall rules in this tip.Continue Reading
One-time password tokens: Reliable authentication mechanisms?
Thinking of purchasing a key fob? Read this identity management and access management Ask the Expert Q&A, and learn from our expert as he examines the pros and cons of this authentication tool.Continue Reading
Password-protecting removable media devices
Safeguard your removable devices. Learn if any products can password-protect the entire device without requiring that the individual connections are encrypted, in this identity management and access control Q&A.Continue Reading
Nmap: How to scan ports and services
Nmap is the ideal tool for performing a simple network inventory or vulnerability assessment. This article offers tips on how to use a NmapContinue Reading
How to clean up dormant accounts in Active Directory
Inactive or dormant Active Directory accounts can serve as a gateway for attackers. Learn how to identify and clean up inactive Active Directory accounts in this Identity Management and Access Control Ask the Expert Q&A.Continue Reading
FISMA essentials for information security practitioners
This tip provides an overview of the Federal Information Security Management Act (FISMA) and what information security professionals need to do in order to comply.Continue Reading
Are there any patch management products that track the patching process?
Before you dip into your IT budget to solve your patching problems, read this Q&A. Our platform security expert examines why security pros should consider using available freeware products to track and manage their patching process.Continue Reading
How to create an enterprise-wide portal policy
Implementing a portal policy can protect an organization from legal woes. Learn the standards and guidelines to create an effective enterprise-wide portal policy.Continue Reading
Use SHA to encrypt sensitive data
Complying with the PCI Data Security Standard is now on the forefront of many security practitioner's minds. Learn how using the Secure Hashing Algorithm can help you encrypt sensitive data and help you meet the PCI Data Security Standard ...Continue Reading
How to protect personal data
Regulations like HIPAA, GLBA and California SB 1386 have made protecting personal data much more of a priority for the security industry. Learn tools and tactics to protect your personal data in this security management Ask the Expert Q&A.Continue Reading
Blocking Web anonymizers in the enterprise
As Internet privacy concerns continue to proliferate, so does the use of Web anonymizers. While these tools can help you block employee access to certain Web sites, they are also beneficial in helping employees evade your efforts. In this tip, ...Continue Reading
Security concerns of extended schema in Active Directory
The Active Directory default schema can be changed if needed. The presence of third-party products that do this can complicate the issue, especially when security is concerned.Continue Reading
An introduction to Active Directory Federation Services
Brien M. Posey discusses key features of Microsofts's Active Directory Federation Services and how it works.Continue Reading
How to install and configure Nmap on Linux
Get tips on how to install and configure Nmap on Linux in an enterprise network environment.Continue Reading
Preventing blind SQL injection attacks
Most security professionals know what SQL injection attacks are and how to protect their Web applications against them. But, they may not know that their preventative measures may be leaving their applications open to blind SQL injection attacks. ...Continue Reading
Out-of-office messages: A security hazard?
Automatically generated out-of-office messages, like the kind created by Microsoft Outlook, have come under scrutiny as a possible security hazard for a number of reasons. Should organizations prohibit the use of out-of-office messages? Serdar ...Continue Reading
Extranet security strategy considerations
Extranets can be beneficial for conducting e-commerce, but if they aren't properly secured, they can pose serious risks to you, your business partners and customers. In this tip, our network security expert, Mike Chapple, provides four tactics for ...Continue Reading
IIS security: Configure Web server permissions for better access control
Updating user access controls as business portfolios expand can help protect confidential data. Learn how to secure user access controls and keep your greatest asset under lock and key by configuring IIS Web server permissions, in this tip by ...Continue Reading
How to install and configure Nmap for Windows
In this second installment of our Nmap Technical Manual, SearchSecurity expert Michael Cobb offers pointers on how to install and configure Nmap for Windows.Continue Reading
Skype: Its dangers and how to protect against them
Skype may be free for end users but it could be costing your enterprise its security. This tip outlines the free VoIP solution's security risks and offers tips for keeping Skype off of the network.Continue Reading
Are smart cards tamper-proof?
While choosing to use smart cards to authenticate users may seem like the smart move, know that they are not tamper-proof. Discover what industry standards are available to protect your organization if your smart cards are tampered with.Continue Reading
The pros and cons of PKI and two-factor authentication methods
There are myriad authentication methods to choose from today; learn the pros and cons of two such methods, Public Key Infrastructures and two-factor authentication systems, and how each system helps validate user identities, in this identity and ...Continue Reading
Should employees have local admin rights?
While it may save you time, granting users local administrator rights also puts your organization at risk. Discover why this practice is considered a risk and learn alternate access control methods you can use to safeguard your organization.Continue Reading
Should an organization design and use their own Certification Authority?
While using a unique Certification Authority may improve an organization's defense-in-depth strategy, using a commercial CA might save you time and money in the long run. Weigh the pros and cons of each, in this Ask the Expert Q&A.Continue Reading
Nmap: A valuable open source tool for network security
Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping, port-scanning and testing for network vulnerabilities.Continue Reading
How to protect the network from DoS attacks
In this Ask the Expert Q&A, our security threat expert, Ed Skoudis, discusses how a new type of DoS attack operates and what you can do to protect your network.Continue Reading
How to create and enforce employee termination procedures
In this Ask the Expert Q&A, Shon Harris, our security management expert, reviews how the the security group, HR and management should work together to define and enforce employee termination policies, and reviews what should be done during each ...Continue Reading
Gap analysis procedures
In this Ask the Expert Q&A, Shon Harris, SearchSecurity's security management expert advises what should be done before a gap analysis is performed, and, provides six common steps of a gap analysis, so organizations will know what to expect before ...Continue Reading
How can I open a closed port so my application can access the Internet?
In this network security Ask the Expert Q&A, Mike Chapple, our resident expert, reveals what should be done if you need to re-open a closed port to allow an application to work.Continue Reading
NetChk Protect 5.5
Information Security magazine's contributing editor, Wayne Rash , reviews Shavlik Technologies NetChk Protect 5.5Continue Reading
Employee termination procedures
What is the best method to determine whether email messages are transmitted as clear text?
In this application security Ask the Expert Q&A, Michael Cobb disccuses how to use a network analyzer tool to determine whether email exchanges are transmitted as clear text.Continue Reading
HTTP attacks: Strategies for prevention
Examine how hackers manipulate HTTP requests to solicit an attack, and learn various guidelines developers should follow to mitigate this threat.Continue Reading
Achieving network security with tomorrow's antivirus tools
Learn about antivirus from an intelligence/technology perspective and offers best practices for simple file-type blocking, and the implementation of heuristic- and reputation-based antivirus tools.Continue Reading