Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity Will a password-strength meter lead to stronger passwords? 07 Oct 2013 SearchSecurity The value of 2,048-bit encryption: Why encryption key length matters 07 Oct 2013 SearchSecurity How certificate pinning improves certificate authority security 07 Oct 2013 SearchSecurity The 2013 OWASP Top 10 list: What's changed and how to respond 10 Sep 2013 SearchSecurity Do two-factor authentication vulnerabilities outweigh the benefits? 10 Sep 2013 SearchSecurity Can an unqualified domain name cause man-in-the-middle attacks? 10 Sep 2013 SearchSecurity RC4 attack details: Can the RC4 encryption algorithm protect SSL/TLS? 09 Sep 2013 SearchSecurity TPM security overview: Defining the benefits of TPM devices 19 Aug 2013 SearchSecurity Open source code management: How to safely use open source libraries 13 Aug 2013 SearchSecurity Identifying and locking down known Java security vulnerabilities 08 Aug 2013 SearchSecurity Why securing internal applications is as important as Web-facing apps 06 Aug 2013 SearchSecurity The advantages of digital watermarking in enterprise data protection 16 Jul 2013 SearchSecurity Application security risks posed by open source Java frameworks 25 Jun 2013 SearchSecurity Is Firefox PDF reader a secure alternative to Adobe Reader? 24 Jun 2013 SearchSecurity What is OCSP? Understanding the Online Certificate Status Protocol 24 Jun 2013 SearchSecurity BB10 security: The risks of running Android apps on BlackBerry 10 21 Jun 2013 SearchSecurity Quiz: Database security issues 30 May 2013 SearchSecurity Using EMET to harden Windows XP and other legacy applications 17 May 2013 SearchSecurity Web application security testing: Is a pen test or code review better? 13 May 2013 SearchSecurity The evolution of threat detection and management 05 May 2013 SearchSecurity NoSQL security: Do NoSQL database security features stack up to RDBMS? 16 Apr 2013 SearchSecurity To nullify targeted attacks, limit out-of-office message security risk 16 Apr 2013 SearchSecurity How to prevent SQL injection attacks by validating user input 15 Apr 2013 SearchSecurity Application whitelisting vs. blacklisting: Which is the way forward? 14 Mar 2013 SearchSecurity Bing security: Is search engine poisoning a problem for Bing users? 12 Mar 2013 SearchSecurity Quiz: Targeted attacks 07 Mar 2013 SearchSecurity Software patching 2.0: Cutting costs with virtual patching, automation 14 Feb 2013 SearchSecurity What risk does the Apple UDID security leak pose to iOS users? 12 Feb 2013 SearchSecurity Windows Server 2012 security: Is it time to upgrade? 08 Jan 2013 SearchDataCenter en Español searchDataCenterES_echapter2 29 Nov 2012 SearchSecurity Implement software development security best practices to support WAFs 20 Nov 2012 SearchSecurity Establish a screen timeout period as part of a BYOD security policy 19 Nov 2012 SearchSecurity Secure Web gateway overview: Implementation best practices 16 Nov 2012 SearchSecurity Under the Surface: How Windows tablet security meets BYOD challenges 12 Oct 2012 SearchSecurity BYOD security policy: Mitigate BYOD risk with device requirements 13 Sep 2012 SearchSecurity The SSL handshake process: Public and privates keys explained 28 Aug 2012 SearchSecurity How to choose secure Android lock patterns 24 Aug 2012 SearchSecurity Information security controls for data exfiltration prevention 24 Aug 2012 SearchSecurity Exploring new features, uses for secure Web gateway appliances 09 Aug 2012 SearchSecurity Using the network to prevent an Oracle TNS Listener poison attack 30 Jul 2012 ComputerWeekly.com “Click-for-tickets” fraud: Teaching users to sidestep Olympic scams 08 Jun 2012 ComputerWeekly.com Password security best practices: Change passwords to passphrases 01 Jun 2012 ComputerWeekly.com Prep and test your Olympics 2012 security contingency plans 22 May 2012 SearchSecurity Examining Kindle Fire security, Silk browser security in the enterprise 07 May 2012 ComputerWeekly.com Adding cybercrime software demos to security awareness training 01 May 2012 SearchSecurity HTML5 security: Will HTML5 replace Flash and increase Web security? 30 Apr 2012 ComputerWeekly.com International computer crime requires an international response 30 Apr 2012 SearchSecurity SIEM vs. DAM technology: Enterprise DAM implementation best practices 23 Apr 2012 SearchSecurity The switch to HTTPS: Understanding the benefits and limitations 23 Apr 2012 SearchSecurity Webmail forensics: Investigating issues with email forwarding security 23 Apr 2012 SearchSecurity What are the best tools for enterprise Windows security logs analysis? 20 Apr 2012 ComputerWeekly.com Building a secure website and maintaining good website design 13 Apr 2012 SearchSecurity How to set up your own secure enterprise Android app store 02 Apr 2012 SearchSecurity For U.S. companies, EU cookie compliance calls for website changes 19 Mar 2012 ComputerWeekly.com Open source software security issues: How to review OSS for security 15 Feb 2012 SearchSecurity Tackling SSL vulnerabilities for secure online transactions 02 Feb 2012 ComputerWeekly.com Incident reporting and employee surveillance laws in other countries 25 Jan 2012 SearchSecurity Explaining how trusted SSL certificates and forged SSL certificates work 25 Jan 2012 SearchSecurity BIOS management best practices: BIOS patches and BIOS updates 25 Jan 2012 ComputerWeekly.com Security policy and international employment laws for hiring overseas 23 Jan 2012 SearchSecurity Exploring Google Chromebook security for the enterprise 23 Jan 2012 ComputerWeekly.com Assessing home offices for compliance with security teleworking policy 11 Jan 2012 ComputerWeekly.com Stop phone tracking and GPS data leakage 06 Jan 2012 ComputerWeekly.com Getting control of IT security documentation 28 Dec 2011 ComputerWeekly.com Outsourcing security issues: Managing outsourced software development 21 Dec 2011 ComputerWeekly.com Segregation of duties: Small business best practices 19 Dec 2011 SearchSecurity How penetration testing helps ensure a secure data store 16 Dec 2011 SearchSecurity OpenStack security analysis: Pros and cons of open source cloud software 14 Dec 2011 ComputerWeekly.com How to prevent unauthorised personnel from hacking voicemail 13 Dec 2011 ComputerWeekly.com The case for ongoing end-user security awareness training 02 Dec 2011 ComputerWeekly.com Managing security during acquisition: A merger integration checklist 18 Nov 2011 ComputerWeekly.com Web application security guidelines for developers 18 Nov 2011 ComputerWeekly.com Add threat modelling to your Web application security best practices 14 Nov 2011 SearchSecurity Securing applications with a network pen test 10 Nov 2011 SearchSecurity OAuth 2.0: Pros and cons of using the federation protocol 09 Nov 2011 SearchSecurity Stop hackers from finding data during Web application fingerprinting 08 Nov 2011 ComputerWeekly.com Maintaining a third-party security policy for DPA compliance 04 Nov 2011 SearchSecurity How to choose application security tools for certain scenarios 02 Nov 2011 SearchSecurity Software testing methodologies: Dynamic versus static application security testing 01 Nov 2011 SearchSecurity Open source testing tools for Web applications: Website vulnerability scanner and recon tools 27 Oct 2011 ComputerWeekly.com Employee monitoring policy to avoid breaking employee monitoring laws 26 Oct 2011 SearchSecurity How to create a problem management process flow to minimize incidents 25 Oct 2011 ComputerWeekly.com How UK security laws and European privacy laws impact businesses 24 Oct 2011 SearchSecurity Managing toolbars and other third-party browser extensions 21 Oct 2011 SearchSecurity Java Virtual Machine architecture: Applet to applet communication 20 Oct 2011 SearchSecurity Managing application permissions through isolated storage 19 Oct 2011 ComputerWeekly.com PHP MVC framework tutorial: Learn Web application development security 17 Oct 2011 SearchSecurity Comparing relational database security and NoSQL security 17 Oct 2011 ComputerWeekly.com Organising an information security discussion on IT security processes 12 Oct 2011 SearchSecurity Zero-day vulnerabilities and the patch management process: To test or not to test? 06 Oct 2011 SearchSecurity How to erase browser history proactively for enterprise security 05 Oct 2011 SearchSecurity Internet Explorer 8 XSS filter: Setting the bar for cross-site scripting prevention 30 Sep 2011 SearchSecurity Symmetric key encryption algorithms and hash function cryptography united 29 Sep 2011 ComputerWeekly.com Secure software development lifecycle: An approach for SMBs 21 Sep 2011 ComputerWeekly.com DPA personal data: Policies for employee information privacy 20 Sep 2011 SearchSecurity Is laptop remote wipe needed for effective laptop data protection? 05 Sep 2011 SearchSecurity Secure coding best practices: PHP and programming language security 01 Sep 2011 SearchSecurity How to mitigate the risk of a TOCTTOU attack 31 Aug 2011 SearchSecurity How MAC and HMAC use hash function encryption for authentication 30 Aug 2011 ComputerWeekly.com Creating secure virtual machines with strong data separation policies 25 Aug 2011 1 2 3 4 5 6 7 8