Tips
Tips
-
MAC address randomization: Understanding the security benefits
MAC address randomization can be used to strengthen privacy and security for enterprises. Fernando Gont explains how it works and how it's used by popular operating systems. Continue Reading
-
How more than 100 malicious Tor nodes were identified
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises. Continue Reading
-
Preventing privilege creep: How to keep access and roles aligned
Privilege creep can result in the abuse of user access and security incidents. Expert Michael Cobb explains how enterprises can keep user roles and privileges aligned. Continue Reading
-
Preventing and responding to a healthcare ransomware infection
The healthcare industry is a target for ransomware infections. Expert Ernie Hayden explains how organizations can take steps to prevent and respond to these attacks. Continue Reading
-
To find the best endpoint security tools, focus on these features
Finding the best endpoint security for your enterprise is a complex, ever-changing task. Learn what features tools offer now to protect endpoints touching the enterprise systems. Continue Reading
-
Ransomware attacks: Why healthcare data is at risk
Ransomware attacks on healthcare data are on the rise. Expert Ernie Hayden explains why healthcare organizations are a target and the effects of these attacks. Continue Reading
-
Runtime application self-protection basics, pros and cons
Learn the basics of runtime application self-protection and the key benefits and drawbacks to this approach to building security into applications as they execute. Continue Reading
-
How to use hashcat to address authentication vulnerabilities
Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading
-
Improve endpoint security protection with advanced tools and techniques
Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Learn how they fit together to improve enterprise endpoint protection. Continue Reading
-
How to handle out-of-band management for network infrastructure
Out-of-band management can be used for handling network infrastructure. Expert Judith Myerson explains the benefits of out-of-band management and how it can be implemented. Continue Reading
-
Building an information security architecture step by step
Achieving cybersecurity readiness requires a solid information security architecture. Expert Peter Sullivan explains the core building blocks that enterprises need to build one. Continue Reading
-
Is the open source architecture beneficial or a security vulnerability?
The open source architecture has its detractors in terms of its security, but Apple's unencrypted iOS 10 kernel raises new questions. Expert Michael Cobb explains the pros and cons. Continue Reading
-
Getting runtime application self-protection launched
A runtime application self-protection tool only sounds complicated. Buying and using a RASP tool, though, may prove a surprisingly simple way to amp up your application security. Continue Reading
-
Major password breaches: How can enterprises manage user risk?
With the large number of password breaches happening, enterprises should look into new methods of protecting their resources. Expert Nick Lewis explains how to reduce user risk. Continue Reading
-
Threat monitoring: Why watching the dark web is crucial
Enterprises should broaden their threat monitoring to include dark web sites. Expert Matt Pascucci explains why it's important, and what enterprises can learn from the dark web. Continue Reading
-
Why HIPAA controls don't do enough for privacy and security
HIPAA controls have failed to keep up with the health industry, but that may not be a bad thing. Expert Mike Chapple discusses the shortcomings in HIPAA privacy and security. Continue Reading
-
Network security alerts: Managing and overcoming obstacles
Network security alerts are high in number and low in accuracy. Expert Kevin Beaver explains strategies security professionals can develop to overcome these obstacles to improving security. Continue Reading
-
Insider security threats: What CISOs can do to mitigate them
Dealing with insider security threats requires a combination of tactics. Expert Mike O. Villegas discusses the various aspects of insider threat mitigation strategies. Continue Reading
-
How to build a cybersecurity plan for enterprise
A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Expert Peter Sullivan explains what goes into these plans and how to get one started. Continue Reading
-
Improving Android device security for enterprises with Android N
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
-
Planning for an IPv6 attack: DDoS, neighbor discovery threats and more
An IPv6 DDoS attacks are imminent, and your network security tools may not be configured for it. Expert Michael Cobb explains how enterprises can prepare its defenses. Continue Reading
-
How to handle a problematic cybersecurity expert on your team
Sometimes hiring a cybersecurity expert to help your security team isn't all it's cracked up to be. Expert Mike O. Villegas explains what CISOs should do when this happens. Continue Reading
-
What CISOs need to incorporate into cloud service-level agreements
CISOs may be unfamiliar with cloud service-level agreements, but they're still a necessary part of enterprise security. Expert Mike O. Villegas has some tips to build cloud SLAs. Continue Reading
-
Discover SIEM capabilities for real-time analysis
Learn what SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks. Continue Reading
-
SIEM analysis interfaces for security professionals
SIEM systems aren't infallible, so it's essential to effective SIEM analysis that it has an interface that eases security professionals' assessment and interpretation tasks. Continue Reading
-
Basic SIEM analytics steps to know
Even basic SIEM analytics can get complicated. Learn three fundamental steps to take that will help you get the most out of your security information and event management tool. Continue Reading
-
DDoS attacks on your DNS provider: Developing a response strategy
Learn from DNS provider NS1's experience with a DDoS attack. Expert Kevin Beaver has tips on developing a mitigation response for a DNS outage in your own enterprise. Continue Reading
-
How Brexit affects data privacy regulations between the US and U.K.
The U.K.'s decision to leave the European Union means the U.S. might need new data privacy regulations. Expert Mike Chapple explains what Brexit means for Privacy Shield and GDPR. Continue Reading
-
Achieving cybersecurity readiness: What enterprises should know
Enterprises need to be ready to act in the face of security incidents and cyberattacks. Expert Peter Sullivan outlines seven elements of proper cybersecurity readiness. Continue Reading
-
Putting IPv6 vulnerabilities under the microscope
Examining IPv6 vulnerabilities prior to deployment is crucial for enterprises. Expert Judith Myerson explains the risks of older gear, unpatched IPv6 ND flaws and other issues. Continue Reading
-
Vulnerabilities in antivirus tools: What does it mean for enterprises?
Discoveries of vulnerabilities in antivirus tools, such as Symantec Antivirus, have put their abilities into question. Expert Nick Lewis explains how it affects enterprises. Continue Reading
-
How infosec professionals can improve their careers through writing
Writing can be one of the best ways to establish your reputation as an infosec professional. Expert Joshua Wright of the SANS Institute explains the best ways to do it. Continue Reading
-
Preventing various types of DDoS attacks on your enterprise's systems
The types of DDoS attacks organizations face have grown and size of these attacks has increased. Expert Michael Cobb explains how to secure systems against common DDoS methods. Continue Reading
-
Government cybersecurity problems can teach enterprises what to do
The U.S. government's cybersecurity problems are in the spotlight, so enterprises should learn from them. Expert Mike Chapple looks at the lessons organizations can learn. Continue Reading
-
How to mitigate bit flipping flaw caused by Rowhammer exploits
A Rowhammer attack on DRAM can induce bit flipping, putting data security at risk. Expert Michael Cobb explains the flaw and what preventive actions enterprises can take. Continue Reading
-
Best practices for an information security assessment
Information security assessments can be effective for identifying and fixing issues in your enterprise's policies. Expert Kevin Beaver explains the key components of the process. Continue Reading
-
Information security culture: How enterprises can build and improve it
Creating and fostering an information security culture isn't easy. Guest contributor Lance Hayden explains how to do it and how to identify signs of improvement. Continue Reading
-
How to address key SSL security issues and vulnerabilities
As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Expert Rob Shapland explains how security professionals can overcome these SSL security issues. Continue Reading
-
How tabletop exercises can help uncover hidden security risks
A regular tabletop exercise could help to identify security risks in scenarios relevant to your organization. Expert Bob Wood explains the steps in the process. Continue Reading
-
The problem with Badlock and branded vulnerability marketing
Branded vulnerability marketing, such as in the case of Badlock, can raise challenges for responsible disclosure. Expert Nick Lewis explains the problems it creates. Continue Reading
-
Rule 41: Why security and privacy experts are wary
The U.S. Supreme Court proposed changes to the FRCP, including to Rule 41. Expert Mike Chapple looks at Rule 41 and why it matters to security and privacy experts. Continue Reading
-
How CMMI models compare and map to the COBIT framework
Following ISACA's recent acquisition of the CMMI Institute, expert Judith Myerson takes a closer look at COBIT and CMMI models and how they compare to one another. Continue Reading
-
Defense-in-depth strategy: Growing cyberthreat intelligence
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
-
Why a federal CISO is necessary for the U.S. government
President Obama's proposed 2017 budget includes a much bigger focus on cybersecurity and calls for the creation of a federal CISO position. Expert Mike Villegas discusses the role. Continue Reading
-
Update your IAM strategy for integration with new technology
Revise your enterprise's IAM strategy for better integration with emerging technologies, such as cloud services and software-defined everything. Expert Johna Till Johnson explains. Continue Reading
-
Why signature-based detection isn't enough for enterprises
Signature-based detection and machine learning algorithms identify malicious code and threats. Expert Michael Cobb explains how both techniques defend networks and endpoints. Continue Reading
-
A safe password system? Here's how
News of the death of the password system is premature, despite the security vulnerabilities of this authentication method. Learn how to create a safe password system. Continue Reading
-
How encryption legislation could affect enterprises
The legal battle between the FBI and Apple brought encryption legislation into the public eye, for better or worse. Expert Mike Chapple discusses the effect of this on enterprises. Continue Reading
-
Removing malware: What are the best methods?
When removing malware for client devices, how can security teams decide if the infection is truly gone? Expert Nick Lewis explains the cleanup process and the best practices. Continue Reading
-
Open source Web apps: Spotting security flaws
Don't assume that your open source Web apps are secure. Expert Kevin Beaver explains the common vulnerabilities and how to include these systems in your security testing. Continue Reading
-
How IAM can address unstructured content security risks
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
-
How to resolve a Web application security vulnerability
Web application security vulnerabilities can exist from browser to SSL/TLS. Expert Brad Causey explains how application security testing and Web application firewalls can address this. Continue Reading
-
Hacking back: A viable strategy or a major risk?
Many organizations are now hacking back at attackers, in an active cyberdefense move. Expert Peter Sullivan explains the possible outcomes and drawbacks of taking action. Continue Reading
-
Why a cap-less cybersecurity budget could harm security
An unlimited cybersecurity budget may sound like a dream, but in reality it could do more harm than good for an enterprise. Expert Mike O. Villegas explains. Continue Reading
-
Software-defined network security: A 'no-touch' approach
One way to achieve software-defined network security is to implement a no-touch approach to networking administration. Learn how it can be done, and what needs to change before it’s possible. Continue Reading
-
Breaking down the DROWN attack and SSLv2 vulnerability
A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Continue Reading
-
PCI DSS 3.2 marks the end of an era, not of the standard
Does PCI DSS 3.2 mark the end of major updates to payment security compliance standards? Expert Mike Chapple discusses the update and what it means for organizations. Continue Reading
-
Where DLP technology is headed, and should you follow?
DLP technology has evolved to include use with cloud applications and threat intelligence feeds. Expert Kevin Beaver delves into new DLP methods enterprises should consider. Continue Reading
-
Machine learning applications: Mitigating the risks
Machine learning applications are beneficial to enterprises, but there are also several risks involved. Expert Judith Myerson explains five ways to combat them. Continue Reading
-
Developing a security incident response policy: Avoiding pitfalls
Does your enterprise have an effective incident response policy? Expert Kevin Beaver explains some of the mistakes that security managers should be avoiding. Continue Reading
-
RSA Conference 2016 draws big crowds, strong encryption
RSA Conference 2016 was a densely-packed affair, with discussions ranging from strong encryption to skills shortage in the industry. Expert Nick Lewis gives a recap. Continue Reading
-
Why physical network security is a necessity for enterprises
A basic practice like physical network security is often ignored by organizations already bogged down by security, but it should still be a high priority. Continue Reading
-
APT-style attacks: How cybercriminals are using them
New research shows cybercriminals are using more advanced attack techniques. Expert Nick Lewis explains what enterprises need to know about the APT-style attacks. Continue Reading
-
The security risks of network sensors in the enterprise
The proliferation of network sensors for embedded systems and IoT devices can create problems for enterprises. Expert Kevin Beaver explains the risks these sensors pose. Continue Reading
-
How to tell a security backdoor from a vulnerability
Security backdoors and security vulnerabilities can often be confused with one another. Expert Michael Cobb offers guidance on distinguishing the two. Continue Reading
-
Cybersecurity vendor liability breaks new ground
Security vendor liability is being brought into the spotlight by various lawsuits, including Affinity Gaming's suit against Trustwave. Here's why what's happening is so important. Continue Reading
-
De-anonymizing malware: Can a new tactic help?
Researchers have discovered a new technique for de-anonymizing software that could help infosec teams attribute malware attacks. Expert Nick Lewis explains how it works. Continue Reading
-
How to use an incident response policy to better collaborate
Several different teams come together to follow an incident response policy after a security breach occurs in an enterprise. Here's how CISOs should manage the process. Continue Reading
-
What enterprises need to know about Internet traffic blocking
Traffic blocking by Internet carriers has stirred up some controversy in the security industry. Expert Kevin Beaver discusses the pros and cons of blocking network traffic. Continue Reading
-
A secure sync-and-share tool can provide powerful file protection
A secure sync-and-share tool can keep sensitive files safe -- if the tool itself properly deployed and managed. Learn how in the expert tip. Continue Reading
-
Application containers: What enterprises need to know
Application containers can be a major asset for deploying mobile and Web applications. Expert Michael Cobb explains what enterprises need to know about containerization. Continue Reading
-
Cybersecurity products: When is it time to change them?
Enterprises should assess their cybersecurity products to make sure they're as effective as possible. Expert Mike O. Villegas discusses how to evaluate cybersecurity tools. Continue Reading
-
The rise of fileless malware attacks
New malware threats can infect systems without leaving any files behind. Expert Nick Lewis explains how fileless malware operates and the best ways for security programs to stop it. Continue Reading
-
The effects of the EU General Data Protection Regulation
The EU General Data Protection Regulation will have an impact on data privacy, but it could also have an effect on enterprise compliance costs. Expert Mike Chapple explains. Continue Reading
-
Identifying the warning signs of network intrusions
Detecting network intrusions requires a plethora of information. Expert Kevin Beaver explains why security teams need to take a big picture view of the network. Continue Reading
-
Adjusting a continuous monitoring strategy to a hybrid era
Your monitoring strategy is vital to keeping networks and data secure. Learn the latest on how to factor the hybrid cloud variable into the security equation. Continue Reading
-
Coping with new Windows 10 patch security issues
Microsoft's new approach to mandatory Windows 10 patching raises new security issues for businesses. Expert Paul DeGroot explains what the problems are and how to deal with them. Continue Reading
-
What an advanced firewall must have to be truly 'next generation'
To be able to call your new firewall 'next generation,' it must have certain advanced firewall capabilities. Learn what these are in this technical tip. Continue Reading
-
How to limit privileged accounts and boost security
Too many privileged accounts can result in access abuse in enterprises. Expert Mike O. Villegas discusses which account privileges should be limited to reduce security incidents. Continue Reading
-
Three ways to build an open source security toolkit
Enterprises should have a diverse set of open source security tools in their arsenal. Here are three factors that can help guide them in building the right security toolkit. Continue Reading
-
The enterprise potential of behavioral biometrics
Biometric authentication has quickly evolved to include behavioral identifiers. Expert Michael Cobb explores the benefits of behavioral biometric technology for enterprises. Continue Reading
-
Adapting an infosec program for emerging threats
An enterprise's information security program must be adaptable to new threats and risks. Expert Nick Lewis explains how to update and evolve these programs. Continue Reading
-
How the Trans-Pacific Partnership agreement affects security
The Trans-Pacific Partnership agreement has riled up many in the security industry with some of its controversial provisions. Expert Mike Chapple explains its effect on cybersecurity. Continue Reading
-
Microsoft Device Guard tackles Windows 10 malware
A new Microsoft security feature takes aim at Windows 10 malware. Expert Michael Cobb explains what enterprises should know about Device Guard. Continue Reading
-
FCC compliance may spell trouble for Wi-Fi router security
Wi-Fi security could be in for a change, thanks to newly proposed FCC compliance rules. Expert Kevin Beaver explains what enterprises need to know about the FCC's proposal. Continue Reading
-
Inside the changing DDoS threat and how to mitigate it
Attackers have discovered new ways to conduct DDoS attacks. Expert Nick Lewis explains how they work, and what enterprises can do about them. Continue Reading
-
Understanding the Wassenaar Arrangement controversy
The Wassenaar Arrangement is the subject of heated debate, but what are the finer points of the argument? Expert Mike O. Villegas explains the arrangement and the debate. Continue Reading
-
Analyzing the integrity of the Diffie-Hellman key exchange
New research has cast doubt on the security of the Diffie-Hellman key exchange method. Expert Michael Cobb explains if enterprises should be concerned. Continue Reading
-
Cybersecurity Information Sharing Act's impact on security
The Cybersecurity Information Sharing Act has many in the security industry nervous, but expert Mike Chapple discusses the bill's minimal impact on enterprise security. Continue Reading
-
Why relying on network perimeter security alone is a failure
A network perimeter security strategy alone can no longer protect enterprises. Expert Paul Henry explains why organizations must adapt. Continue Reading
-
Weighing the value of deception techniques for enterprises
Deception techniques aren't new to security strategies, but they could be on the rise. Is it really necessary for enterprises to hack back? Expert Kevin Beaver examines. Continue Reading
-
The pros and cons of cybervigilantes and Wifatch
Vigilante malware called Wifatch aims to protect IoT devices and home routers. Expert Nick Lewis explores cybervigilantism and potential risks and benefits to enterprises. Continue Reading
-
How best to monitor today's murky threat environment
Today's threat environment can be murky. Learn the latest means for rooting out the fast-moving malicious actors that populate it. Continue Reading
-
Windows 10 privacy settings: Concerns versus reality
New Windows 10 privacy settings require balancing the benefits of new features against the risk of revealing too much personal information online. Expert Michael Cobb explains. Continue Reading
-
Integrated security suite advantages and drawbacks
Can an integrated security suite provide advantages in cost and performance? We look at key focus areas for security practitioners as security tools increasingly converge. Continue Reading
-
Vendor relationship management: Breaking up is hard to do
Ending a security vendor relationship is a tricky process and should be handled with care. Expert Mike O. Villegas discusses how and when to end vendor contracts safely. Continue Reading
-
Improve SDN security with a proper risk management plan
Enterprise SDN controllers can be vulnerable to attacks, but a proper risk management plan can improve SDN controller security. Judith Myerson explains how to get started. Continue Reading
-
Four pen testing tools for improving midmarket security
The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies. Continue Reading
-
Securing APIs is key to counter attacks
Application programming interfaces are in wide use, and hackers know it. Securing APIs needs to become a top IT priority. Continue Reading
-
Life after the Safe Harbor agreement: How to stay compliant
Now that the Safe Harbor agreement is invalid, U.S. and EU organizations need to find new ways to securely handle data so they can stay in business. Continue Reading