Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity Patching and updating applications: How much time should be spent? 24 Oct 2016 SearchSecurity Preventing privilege creep: How to keep access and roles aligned 24 Oct 2016 SearchSecurity New tactics for better endpoint security threat prevention 21 Oct 2016 SearchSecurity Improve endpoint security protection with advanced tools and techniques 10 Oct 2016 SearchSecurity Is the open source architecture beneficial or a security vulnerability? 04 Oct 2016 SearchSecurity Internal PKI: What are the benefits of enterprises moving it in-house? 30 Sep 2016 SearchSecurity How can privileged access accounts be managed in large companies? 29 Sep 2016 SearchSecurity How are weak passwords banned with Microsoft's Smart Password Lockout? 28 Sep 2016 SearchSecurity Preparing for new DDoS techniques: Mitigating the inevitable attack 28 Sep 2016 SearchSecurity How did a malicious app slip past Google Play app store security? 27 Sep 2016 SearchSecurity How does SandJacking let attackers load malware on iOS devices? 26 Sep 2016 SearchSecurity Trusted? Certificate authority risks and how to manage them 21 Sep 2016 SearchSecurity Improving Android device security for enterprises with Android N 06 Sep 2016 SearchSecurity Planning for an IPv6 attack: DDoS, neighbor discovery threats and more 02 Sep 2016 SearchSecurity CVSS v3.0: What does Oracle's move mean for vulnerability assessment? 02 Sep 2016 SearchSecurity Why did QuickTime for Windows move to end of life so abruptly? 01 Sep 2016 SearchSecurity What does this year's Android Security Report mean for enterprises? 31 Aug 2016 SearchSecurity How can web shells be used to exploit security tools and servers? 30 Aug 2016 SearchSecurity How does the Android Trojan Triada infect a device's core processes? 29 Aug 2016 SearchSecurity What's New in IAM Security and Strategy 19 Aug 2016 IoT Agenda When your IAM policy encounters the internet of things 11 Aug 2016 SearchSecurity How did a Java security vulnerability with a bad patch go unnoticed? 05 Aug 2016 SearchSecurity Will the Google Certificate Transparency tool prevent certificate abuse? 04 Aug 2016 SearchSecurity Secure web browser options: Does Firefox or Chrome fare better? 03 Aug 2016 SearchSecurity Is the Bitdefender ransomware vaccine an effective method of protection? 02 Aug 2016 SearchSecurity Why are both symmetric and asymmetric encryption used in OpenPGP? 01 Aug 2016 SearchSecurity Preventing various types of DDoS attacks on your enterprise's systems 22 Jul 2016 SearchSecurity How to mitigate bit flipping flaw caused by Rowhammer exploits 19 Jul 2016 SearchSecurity Are Amazon devices running on the latest Fire OS 5 secure? 08 Jul 2016 SearchSecurity How did a pirated app bypass Apple's App Store security? 07 Jul 2016 SearchSecurity Lenovo SHAREit: How does its hardcoded password vulnerability work? 06 Jul 2016 SearchSecurity Does mass scanning of the internet do more harm than good? 05 Jul 2016 SearchSecurity How can the AirDroid app phone hijacking be prevented? 04 Jul 2016 SearchSecurity Session cookies: When should they be protected by a salted hash? 08 Jun 2016 SearchSecurity Does the Icera modem vulnerability in Blackphones affect other devices? 06 Jun 2016 SearchSecurity Oracle Java browser plug-in: How will its death affect enterprises? 06 Jun 2016 SearchSecurity What security log management best practices should my team follow? 02 Jun 2016 SearchSecurity How does the mandatory access control model and application sandboxing differ? 01 Jun 2016 SearchSecurity Learn about user authentication methods, from passwords to biometrics 20 May 2016 SearchSecurity Why signature-based detection isn't enough for enterprises 18 May 2016 SearchSecurity How did MongoDB database misconfiguration lead to exposure? 11 May 2016 SearchSecurity How can common mobile application security risks be reduced? 10 May 2016 SearchSecurity Is a cryptographic algorithm behind Juniper's backdoor? 09 May 2016 SearchSecurity Application development security requires forethought 09 May 2016 SearchSecurity How can Kerberos protocol vulnerabilities be mitigated? 06 May 2016 SearchSecurity How did AVG Web TuneUp expose user data? 05 May 2016 SearchSecurity Breaking down the DROWN attack and SSLv2 vulnerability 21 Apr 2016 SearchSecurity How can BGP hijacking be detected and prevented? 19 Apr 2016 SearchSecurity Is eDellRoot certificate vulnerability an isolated problem? 18 Apr 2016 SearchSecurity What does 'FIPS 140-2 Level 2 certified' mean for security? 14 Apr 2016 SearchSecurity How does the M-Pesa service work and what are the risks? 13 Apr 2016 SearchSecurity What HTML5 security measures do enterprises need to take? 13 Apr 2016 SearchSecurity Personal email servers: What are the security risks? 06 Apr 2016 SearchSecurity How to tell a security backdoor from a vulnerability 25 Mar 2016 SearchSecurity How can a DMARC policy improve email security? 23 Mar 2016 SearchSecurity What's the difference between two-step verification and 2FA? 22 Mar 2016 SearchSecurity Are self-encrypting drives the right choice for enterprises? 18 Mar 2016 SearchSecurity Jeeves programming language: Can it improve security? 17 Mar 2016 SearchSecurity Can Firefox tracking protection improve private browsing? 16 Mar 2016 SearchSecurity Application containers: What enterprises need to know 29 Feb 2016 SearchSecurity How does Microsoft's FourQ cryptographic library work? 24 Feb 2016 SearchSecurity What's the best risk analysis method for enterprises? 24 Feb 2016 SearchSecurity How does Windows Defender Offline protect endpoints? 23 Feb 2016 SearchSecurity OPM breach: What's the risk of exposed fingerprint data? 22 Feb 2016 SearchSecurity Can application wrappers improve mobile security? 18 Feb 2016 SearchSecurity The enterprise potential of behavioral biometrics 19 Jan 2016 SearchSecurity TLS protocol: Can a client puzzle improve security? 15 Jan 2016 SearchSecurity Is it safe to use Windows 10 Wi-Fi Sense? 14 Jan 2016 SearchSecurity How can security vendor hacks affect enterprises? 12 Jan 2016 SearchSecurity Microsoft Device Guard tackles Windows 10 malware 11 Jan 2016 SearchSecurity How can new template injection vulnerabilities be stopped? 08 Jan 2016 SearchSecurity Should the RC4 cipher still be used in enterprises? 30 Dec 2015 SearchSecurity How does the fake Android app BeNews work? 30 Dec 2015 SearchSecurity How can software transplants fix bad code? 28 Dec 2015 SearchSecurity What effect would DMCA changes have on security researchers? 24 Dec 2015 SearchSecurity Analyzing the integrity of the Diffie-Hellman key exchange 24 Dec 2015 SearchSecurity How can enterprises stop the OpenSSH vulnerability? 24 Dec 2015 SearchSecurity Windows 10 privacy settings: Concerns versus reality 04 Dec 2015 SearchSecurity Open source .Net: Are security risks higher? 04 Dec 2015 SearchSecurity Should enterprises use the Let's Encrypt open certificate authority? 02 Dec 2015 SearchSecurity Can facial recognition authentication improve mobile security? 01 Dec 2015 SearchSecurity Android M security: Is it enterprise-ready? 30 Nov 2015 SearchSecurity How has the NIST random number generation guidance changed? 25 Nov 2015 SearchSecurity Securing APIs is key to counter attacks 20 Nov 2015 SearchSecurity How can address bar spoofing vulnerabilities be prevented? 20 Nov 2015 SearchSecurity How does OpenPGP encryption improve messaging security? 17 Nov 2015 SearchSecurity How to ensure a secure API 16 Nov 2015 SearchSecurity Can Google's Chrome extension policy improve Web security? 16 Nov 2015 SearchSecurity Code security: Can a continuous delivery model be secured? 16 Nov 2015 SearchSecurity How does the Logjam vulnerability affect TLS encryption? 13 Nov 2015 SearchSecurity Secure Hash Algorithm-3: How SHA-3 is a next-gen security tool 30 Oct 2015 SearchSecurity XSS vs. XSSI: What is cross-site script inclusion? 26 Oct 2015 SearchSecurity Does the AFNetworking library inhibit iOS app security? 23 Oct 2015 SearchSecurity Can a subscription ease SSL certificate management? 23 Oct 2015 IoT Agenda What's the key to IoT device discovery in the enterprise? 22 Oct 2015 SearchSecurity Can opportunistic encryption improve browser security? 21 Oct 2015 SearchSecurity Getting to the bottom of the software vulnerability disclosure debate 12 Oct 2015 SearchSecurity How can mobile certificate security risks be reduced? 03 Sep 2015 SearchSecurity Trading Microsoft Patch Tuesday in for Windows Update for Business 03 Sep 2015 SearchSecurity Is Project Shumway a viable enterprise option to replace Flash? 03 Sep 2015 1 2 3 4 5 6 7 8