Michael Cobb CISSP-ISSAP - SearchSecurity By year: 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 SearchSecurity How can Microsoft XML vulnerabilities be mitigated? 19 Dec 2014 SearchSecurity Silverlight security: Defending against browser plug-in attacks 18 Dec 2014 SearchSecurity Can OAuth 2.0 strengthen authentication? 17 Dec 2014 SearchSecurity How can e-commerce website security be ensured? 15 Dec 2014 SearchSecurity Can encrypted calling apps boost BYOD security? 12 Dec 2014 SearchSecurity How can forged certificates from trusted vendors be stopped? 12 Dec 2014 SearchSecurity How do XMPP standard changes help secure instant messaging? 05 Dec 2014 SearchSecurity Is the Blackphone the answer to enterprise mobile device security? 04 Dec 2014 SearchSecurity Can setting a cache-control header improve application data security? 01 Dec 2014 SearchSecurity Are LibreSSL and BoringSSL safe OpenSSL alternatives? 01 Dec 2014 SearchSecurity Are malicious mobile apps a threat to powered-down smartphones? 25 Nov 2014 SearchSecurity Will a bug bounty program improve enterprise software security? 12 Nov 2014 SearchSecurity XSS flaws: Why aren't major websites catching XSS vulnerabilities? 12 Nov 2014 SearchSecurity Will the Core Infrastructure Initiative improve open source safety? 11 Nov 2014 SearchSecurity Will the Tails OS help secure enterprise communications? 06 Nov 2014 SearchSecurity Can a smartphone kill switch improve enterprise mobile security? 06 Nov 2014 SearchSecurity SHA-2 algorithm: The how and why of the transition 17 Oct 2014 SearchSecurity Microsoft SQL Server 2008 end of life: When's the time to migrate? 15 Oct 2014 SearchSecurity Should hypervisors be part of every enterprise security strategy? 14 Oct 2014 SearchSecurity Can quantum key distribution improve smartphone and tablet security? 13 Oct 2014 SearchSecurity Can open source cryptography libraries be trusted? 13 Oct 2014 SearchSecurity Windows 8.1 features that secure BYOD access 03 Oct 2014 SearchSecurity VDI and BYOD: Enterprise mobile security solution or security faux pas? 09 Sep 2014 SearchSecurity Update your application security policy after Heartbleed 02 Sep 2014 SearchSecurity Beyond the Page: Application security in the age of open source 02 Sep 2014 SearchSecurity Take inventory of your open source software security 02 Sep 2014 SearchSecurity How to reduce the chances of distributed denial-of-service attacks 29 Aug 2014 SearchSecurity Security School: Distributed denial-of-service attack defense 29 Aug 2014 SearchSecurity How can the OWASP Top Ten reduce Web application vulnerabilities? 28 Aug 2014 SearchSecurity The key to assigning risk values in an IT security risk assessment 27 Aug 2014 SearchSecurity Beating socially engineered malware with Web browser security 19 Aug 2014 SearchSecurity Can FIPS 140-2 certification improve enterprise mobile security? 19 Aug 2014 SearchSecurity Cost-effective Web application security testing 19 Aug 2014 SearchSecurity Enterprise disk encryption options after the end of TrueCrypt 04 Aug 2014 SearchSecurity Third-party application security evaluation tools and services 25 Jul 2014 SearchSecurity Beating back malicious mobile apps 24 Jul 2014 SearchSecurity The best free vulnerability risk assessment tools 24 Jul 2014 SearchSecurity Mobile keyloggers and touchscreen detection attacks 23 Jul 2014 SearchSecurity Microsoft EMET 5.0: New features and functionality 22 Jul 2014 SearchSecurity Building the business case for a formal patch management program 18 Jul 2014 SearchSecurity In-house app stores a handy weapon against malicious mobile apps 18 Jul 2014 SearchSecurity Mobile app data slurping: Mitigating the risk 17 Jul 2014 SearchSecurity Using XSS filtering to mitigate XSS vulnerabilities 15 Jul 2014 SearchSecurity Mobile keyloggers: Defense measures against mobile keystroke logging 15 Jul 2014 SearchSecurity Chrome bug highlights speech-recognition security risks 14 Jul 2014 SearchSecurity After Heartbleed: New realities of open source software security 08 Jul 2014 SearchSecurity Do rogue mobile apps threaten Android device security? 19 Jun 2014 SearchCIO How to prevent spyware on mobile devices 18 Jun 2014 SearchSecurity Windows Error Reporting: Is crash data a security vulnerability? 18 Jun 2014 SearchSecurity Security validation for cloud-based applications 13 Jun 2014 SearchSecurity Plan to migrate before Windows Server 2003 end of life 13 Jun 2014 SearchSecurity Is there such a thing as a secure smartphone? 11 Jun 2014 SearchSecurity Are malicious mobile apps a mere inconvenience or a real threat? 11 Jun 2014 SearchSecurity Apple iOS security secrets revealed: Is iOS truly enterprise-ready? 10 Jun 2014 SearchSecurity Defense is the best offense for preventing DoS attacks 05 Jun 2014 SearchSecurity How to avoid brand hacking and ensure enterprise social media security 06 May 2014 SearchSecurity Google AdID spurs talk of replacing third-party cookies in enterprises 30 Apr 2014 SearchSecurity How to use the Metasploit Framework to test for new vulnerabilities 30 Apr 2014 SearchSecurity Mobile email security: Mitigating JavaScript risks, data loss 29 Apr 2014 SearchSecurity Defense best practices for a man-in-the-middle attack 24 Apr 2014 SearchSecurity Authentication caching: How it reduces enterprise network congestion 28 Mar 2014 SearchSecurity Apple iMessage security: Is iMessage encryption strong enough? 27 Mar 2014 SearchSecurity Symantec Protection Center Enterprise: Preparing for end of life 21 Mar 2014 SearchSecurity Is the Aviator browser the next new Web browser for enterprises? 21 Mar 2014 SearchSecurity HealthCare.gov security issues: Lessons learned for enterprises 21 Mar 2014 SearchSecurity API security: How to ensure secure API use in the enterprise 10 Mar 2014 SearchSecurity HSTS: How HTTP Strict Transport Security enhances application security 27 Feb 2014 SearchSecurity Developing a continuous security monitoring program for 24/7 security 26 Feb 2014 SearchSecurity How Google Chrome Canary improves malware defense, prevents infection 25 Feb 2014 SearchSecurity CAMP technology: The key to thwarting socially engineered malware? 24 Feb 2014 SearchSecurity With its new security features, is Dropbox safe for enterprise use? 21 Feb 2014 SearchSecurity SHA-1 to SHA-2: The future of SSL and enterprise application security 03 Feb 2014 SearchSecurity Microsoft Office 2003: Staying safe after the security support stops 31 Jan 2014 SearchSecurity Preventing plaintext password problems in Google Chrome 30 Jan 2014 SearchSecurity Smart defense is good offense: Rethink how you use your SIEM product 29 Jan 2014 SearchSecurity Securing endpoint devices with code-execution prevention 14 Jan 2014 SearchSecurity The backdoor threat of Trusted Platform Module and Windows 8 14 Jan 2014 SearchSecurity Elliptic curve cryptography: What ECC can do for the enterprise 14 Jan 2014 SearchSecurity What are the top instant messaging security risks facing enterprises? 10 Jan 2014 SearchSecurity SSH security risks: Assessment and remediation planning 09 Jan 2014 SearchSecurity Windows XP upgrade planning: Preparing for Windows XP end of life 07 Jan 2014 SearchSecurity BlackBerry backdoor: Do BlackBerry credential logs pose a threat? 02 Jan 2014 SearchSecurity How to identify and secure data egress points to prevent data loss 02 Jan 2014 SearchSecurity Windows 8.1 security overview: Enterprise features and tools 02 Jan 2014 Find Contributors Alphabetically A B C D E F G H I J K L M N O P Q R S T U V W X Y Z