Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity What new NIST password recommendations should enterprises adopt? 02 Jan 2017 SearchSecurity SWIFT network communications: How can bank security be improved? 23 Dec 2016 SearchSecurity Combatting the top cybersecurity threats with intelligence 22 Dec 2016 SearchSecurity Meet security goals by avoiding threat intel and analytics mistakes 14 Dec 2016 SearchSecurity How do the Linux kernel memory protection features on Android work? 02 Dec 2016 SearchSecurity How does the HummingBad malware enable click fraud? 01 Dec 2016 SearchSecurity Test your privileged user management knowledge 01 Dec 2016 SearchSecurity How did a full access OAuth token get issued to the Pokémon GO app? 29 Nov 2016 SearchSecurity Is Barclays' phone banking biometric authentication system secure? 28 Nov 2016 SearchSecurity Bug bounties: How does Apple's program compare to others? 28 Nov 2016 SearchSecurity Are browsers using the HTTP/2 protocol vulnerable to HEIST attacks? 15 Nov 2016 SearchSecurity Preventing trusted users from misusing their privileges 10 Nov 2016 SearchSecurity How does auto-rooting malware LevelDropper gain device root access? 27 Oct 2016 SearchSecurity Asset tracking: What products and services can trace device location? 27 Oct 2016 SearchSecurity Why have macro malware authors moved toward using OLE technology? 25 Oct 2016 SearchSecurity Can an HTML5 document with a digital signature be authenticated? 25 Oct 2016 SearchSecurity Runtime application self-protection from A to Z 24 Oct 2016 SearchSecurity Patching and updating applications: How much time should be spent? 24 Oct 2016 SearchSecurity Preventing privilege creep: How to keep access and roles aligned 24 Oct 2016 SearchSecurity New tactics for better endpoint security threat prevention 21 Oct 2016 SearchSecurity Improve endpoint security protection with advanced tools and techniques 10 Oct 2016 SearchSecurity Is the open source architecture beneficial or a security vulnerability? 04 Oct 2016 SearchSecurity Internal PKI: What are the benefits of enterprises moving it in-house? 30 Sep 2016 SearchSecurity How can privileged access accounts be managed in large companies? 29 Sep 2016 SearchSecurity How are weak passwords banned with Microsoft's Smart Password Lockout? 28 Sep 2016 SearchSecurity How did a malicious app slip past Google Play app store security? 27 Sep 2016 SearchSecurity How does SandJacking let attackers load malware on iOS devices? 26 Sep 2016 SearchSecurity physical security 21 Sep 2016 SearchSecurity Trusted? Certificate authority risks and how to manage them 21 Sep 2016 SearchSecurity buffer overflow 21 Sep 2016 SearchSecurity Improving Android device security for enterprises with Android N 06 Sep 2016 SearchSecurity Planning for an IPv6 attack: DDoS, neighbor discovery threats and more 02 Sep 2016 SearchSecurity CVSS v3.0: What does Oracle's move mean for vulnerability assessment? 02 Sep 2016 SearchSecurity Why did QuickTime for Windows move to end of life so abruptly? 01 Sep 2016 SearchSecurity Kerberos 31 Aug 2016 SearchSecurity What does this year's Android Security Report mean for enterprises? 31 Aug 2016 SearchSecurity How can web shells be used to exploit security tools and servers? 30 Aug 2016 SearchSecurity How does the Android Trojan Triada infect a device's core processes? 29 Aug 2016 SearchSecurity What's New in IAM Security and Strategy 19 Aug 2016 IoT Agenda When your IAM policy encounters the internet of things 11 Aug 2016 SearchSecurity How did a Java security vulnerability with a bad patch go unnoticed? 05 Aug 2016 SearchSecurity Will the Google Certificate Transparency tool prevent certificate abuse? 04 Aug 2016 SearchSecurity Secure web browser options: Does Firefox or Chrome fare better? 03 Aug 2016 SearchSecurity Is the Bitdefender ransomware vaccine an effective method of protection? 02 Aug 2016 SearchSecurity Why are both symmetric and asymmetric encryption used in OpenPGP? 01 Aug 2016 SearchSecurity Preventing various types of DDoS attacks on your enterprise's systems 22 Jul 2016 SearchSecurity How to mitigate bit flipping flaw caused by Rowhammer exploits 19 Jul 2016 SearchSecurity Are Amazon devices running on the latest Fire OS 5 secure? 08 Jul 2016 SearchSecurity How did a pirated app bypass Apple's App Store security? 07 Jul 2016 SearchSecurity Lenovo SHAREit: How does its hardcoded password vulnerability work? 06 Jul 2016 SearchSecurity Does mass scanning of the internet do more harm than good? 05 Jul 2016 SearchSecurity How can the AirDroid app phone hijacking be prevented? 04 Jul 2016 SearchSecurity DOS (Disk Operating System) 21 Jun 2016 SearchSecurity Session cookies: When should they be protected by a salted hash? 08 Jun 2016 SearchSecurity Does the Icera modem vulnerability in Blackphones affect other devices? 06 Jun 2016 SearchSecurity Oracle Java browser plug-in: How will its death affect enterprises? 06 Jun 2016 SearchSecurity What security log management best practices should my team follow? 02 Jun 2016 SearchSecurity How does the mandatory access control model and application sandboxing differ? 01 Jun 2016 SearchSecurity Learn about user authentication methods, from passwords to biometrics 20 May 2016 SearchSecurity Why signature-based detection isn't enough for enterprises 18 May 2016 SearchSecurity Certificate Revocation List (CRL) 16 May 2016 SearchSecurity How did MongoDB database misconfiguration lead to exposure? 11 May 2016 SearchSecurity How can common mobile application security risks be reduced? 10 May 2016 SearchSecurity Is a cryptographic algorithm behind Juniper's backdoor? 09 May 2016 SearchSecurity Application development security requires forethought 09 May 2016 SearchSecurity How can Kerberos protocol vulnerabilities be mitigated? 06 May 2016 SearchSecurity How did AVG Web TuneUp expose user data? 05 May 2016 SearchSecurity Breaking down the DROWN attack and SSLv2 vulnerability 21 Apr 2016 SearchSecurity How can BGP hijacking be detected and prevented? 19 Apr 2016 SearchSecurity Is eDellRoot certificate vulnerability an isolated problem? 18 Apr 2016 SearchSecurity What does 'FIPS 140-2 Level 2 certified' mean for security? 14 Apr 2016 SearchSecurity How does the M-Pesa service work and what are the risks? 13 Apr 2016 SearchSecurity What HTML5 security measures do enterprises need to take? 13 Apr 2016 SearchSecurity Personal email servers: What are the security risks? 06 Apr 2016 SearchSecurity How to tell a security backdoor from a vulnerability 25 Mar 2016 SearchSecurity How can a DMARC policy improve email security? 23 Mar 2016 SearchSecurity What's the difference between two-step verification and 2FA? 22 Mar 2016 SearchSecurity Are self-encrypting drives the right choice for enterprises? 18 Mar 2016 SearchSecurity Jeeves programming language: Can it improve security? 17 Mar 2016 SearchSecurity Can Firefox tracking protection improve private browsing? 16 Mar 2016 SearchSecurity Application containers: What enterprises need to know 29 Feb 2016 SearchSecurity How does Microsoft's FourQ cryptographic library work? 24 Feb 2016 SearchSecurity What's the best risk analysis method for enterprises? 24 Feb 2016 SearchSecurity How does Windows Defender Offline protect endpoints? 23 Feb 2016 SearchSecurity OPM breach: What's the risk of exposed fingerprint data? 22 Feb 2016 SearchSecurity Can application wrappers improve mobile security? 18 Feb 2016 WhatIs.com Pretty Easy Privacy (pEp) 21 Jan 2016 SearchSecurity The enterprise potential of behavioral biometrics 19 Jan 2016 SearchSecurity TLS protocol: Can a client puzzle improve security? 15 Jan 2016 SearchSecurity Is it safe to use Windows 10 Wi-Fi Sense? 14 Jan 2016 SearchSecurity How can security vendor hacks affect enterprises? 12 Jan 2016 SearchSecurity Microsoft Device Guard tackles Windows 10 malware 11 Jan 2016 SearchSecurity How can new template injection vulnerabilities be stopped? 08 Jan 2016 SearchSecurity Should the RC4 cipher still be used in enterprises? 30 Dec 2015 SearchSecurity How does the fake Android app BeNews work? 30 Dec 2015 SearchSecurity How can software transplants fix bad code? 28 Dec 2015 SearchSecurity What effect would DMCA changes have on security researchers? 24 Dec 2015 SearchSecurity Analyzing the integrity of the Diffie-Hellman key exchange 24 Dec 2015 SearchSecurity How can enterprises stop the OpenSSH vulnerability? 24 Dec 2015 SearchSecurity Windows 10 privacy settings: Concerns versus reality 04 Dec 2015 1 2 3 4 5 6 7 8 9