Michael Cobb CISSP-ISSAP - SearchSecurity ComputerWeekly.com Project collaboration tools: Web security policy for B2B collaboration 25 Aug 2011 ComputerWeekly.com Internal security audit: The importance of security system assessment 25 Aug 2011 SearchSecurity Hop-by-hop encryption: A safe enterprise email encryption option? 22 Aug 2011 SearchSecurity How Microsoft security assessment tools can benefit your enterprise 19 Aug 2011 SearchSecurity URL shortening security best practices 18 Aug 2011 SearchSecurity How an IIS Web application pool can help secure your enterprise 11 Aug 2011 SearchSecurity Debug and test Web applications using Burp Proxy 10 Aug 2011 ComputerWeekly.com Best practices for audit, log review for IT security investigations 08 Aug 2011 ComputerWeekly.com Instant messaging: Corporate policies for IM security issues 08 Aug 2011 SearchSecurity Mitigating security risks of mobile location-based services technology 01 Aug 2011 ComputerWeekly.com Website secure login: Alternatives to out-of-wallet questions 27 Jul 2011 ComputerWeekly.com Create an information sharing policy for protection from data leakage 27 Jul 2011 SearchSecurity Understanding iPad security concerns for better iPad enterprise management 11 Jul 2011 ComputerWeekly.com Online authentication methods: Personal information cards and Web SSO 08 Jun 2011 ComputerWeekly.com How to perform a proper, secure third-party software download 01 Jun 2011 ComputerWeekly.com How to use the free Microsoft Security Risk Management Guide 10 May 2011 ComputerWeekly.com RFID projects: Implementation considerations, RFID security concerns 04 May 2011 ComputerWeekly.com Secure public Wi-Fi: Locking down employees' Wi-Fi security settings 04 May 2011 ComputerWeekly.com Secure USB best practices: Choosing USB hardware encryption 07 Apr 2011 ComputerWeekly.com Smartphone risk: Does your corporate smartphone policy stack up? 05 Apr 2011 ComputerWeekly.com What to include in a secure video conference policy 01 Apr 2011 ComputerWeekly.com What is OpenID? How to use OpenID SSO in your organisation 22 Mar 2011 ComputerWeekly.com Choosing the best uninterruptible power supply for your organisation 18 Mar 2011 ComputerWeekly.com A social networking policy template for information awareness training 09 Mar 2011 SearchSecurity Social networking best practices for preventing social network malware 28 Feb 2011 SearchMobileComputing Can smartphones get viruses and spread them to the network? 28 Feb 2011 SearchSecurity Valuable third-party patch deployment software, tools 28 Feb 2011 ComputerWeekly.com Data breach policy: Regaining information systems security and control 23 Feb 2011 ComputerWeekly.com How to choose the best fire security safes for your organisation 16 Feb 2011 SearchSecurity Understanding the value of an enterprise application-aware firewall 31 Jan 2011 ComputerWeekly.com Free Windows security tools: Using Microsoft EMET 17 Jan 2011 ComputerWeekly.com How to create a data aggregation risk mitigation plan 05 Jan 2011 ComputerWeekly.com Corporate shredding: The value of confidential document destruction 05 Jan 2011 ComputerWeekly.com Digital forensic investigation procedure: Form a computer forensics policy 05 Jan 2011 ComputerWeekly.com PRIMER: Mac OS X Snow Leopard antivirus features 04 Jan 2011 ComputerWeekly.com Good Practice Guide 13: Security monitoring policy for CoCo compliance 08 Dec 2010 ComputerWeekly.com Company security policy: How to write standard work instructions 01 Dec 2010 SearchSecurity Using a Web application honeypot to boost security for Web applications 29 Nov 2010 ComputerWeekly.com Opinion: Apply computer quarantine via network access control policy 29 Nov 2010 ComputerWeekly.com How to detect hacking with a Microsoft file integrity checker 24 Nov 2010 ComputerWeekly.com Fax machine security: Creating a corporate faxing policy 17 Nov 2010 ComputerWeekly.com How to use the Microsoft FCIV command-line checksum tool 17 Nov 2010 ComputerWeekly.com Case study: Physical security awareness and smartphone security policy 10 Nov 2010 SearchSecurity Android enterprise security: Mobile phone data protection advice 08 Nov 2010 SearchSecurity Microsoft IIS 7 security best practices 18 Oct 2010 ComputerWeekly.com DNS server security: Finding and using DNSSEC tutorial resources 13 Oct 2010 ComputerWeekly.com Personnel and security: The value of continually screening employees 06 Oct 2010 SearchSecurity Validating ERP system security and ERP best practices 29 Sep 2010 ComputerWeekly.com Benchmark security systems with free network security assessment tools 29 Sep 2010 ComputerWeekly.com Network password security: Following password policy best practices 13 Sep 2010 ComputerWeekly.com Pros and cons of Skype security for encrypted phone calls 01 Sep 2010 ComputerWeekly.com Microsoft security tools: MBSA and MSAT explained 01 Sep 2010 SearchSecurity Unmasking data masking techniques in the enterprise 24 Aug 2010 SearchSecurity Fake antivirus pop-up scams: Forming a security awareness training plan 09 Aug 2010 ComputerWeekly.com Hard-disk erasure: Using HDDerase and Secure Erase hard-drive eraser 28 Jul 2010 SearchSecurity How to use a PDF redaction tool with a redacted document policy 19 Jul 2010 ComputerWeekly.com ISO 27001 SoA: Creating an information security policy document 14 Jul 2010 SearchSecurity Utilizing a hash function algorithm to help secure data 07 Jul 2010 SearchSecurity Why it's important to turn on DEP and ASLR Windows security features 05 Jul 2010 ComputerWeekly.com Prevent data leakage with secure media reuse policies 16 Jun 2010 SearchSecurity Enterprise PDF attack prevention best practices 07 Jun 2010 SearchSecurity Static source code analysis tools: Pros and cons 27 May 2010 SearchSecurity MD5 security: Time to migrate to SHA-1 hash algorithm? 19 May 2010 SearchSecurity Using fuzzing for internal application security testing 14 May 2010 SearchSecurity Performing a security risk analysis to assess acceptable level of risk 16 Apr 2010 ComputerWeekly.com Using resource allocation management to prevent DoS and other attacks 05 Apr 2010 ComputerWeekly.com Using resource allocation management to prevent DoS and other attacks 31 Mar 2010 SearchSecurity SANS Top 25 programming errors: Application security best practices 29 Mar 2010 SearchSecurity DBMS security: Data warehouse advantages 25 Mar 2010 SearchSecurity OpenOffice security: Concerns when moving from Microsoft Office 24 Mar 2010 ComputerWeekly.com Data Protection Act of 1998 explained: Protecting personal data 24 Mar 2010 SearchSecurity The benefits of application proxy firewalls 18 Mar 2010 SearchCloudSecurity Cloud computing risks: Secure encryption key management on virtual machines 16 Mar 2010 SearchSecurity Advanced Encryption Standard and AES ciphers: Can they be cracked? 09 Mar 2010 ComputerWeekly.com Cloud-based services require stalwart business continuity plans 03 Mar 2010 SearchSecurity Preventing iPhone spying and other mobile management tips 24 Feb 2010 SearchSecurity Can secure FTP services protect sensitive data from hackers? 16 Feb 2010 ComputerWeekly.com How to use Google Webmaster tools to help protect your site 15 Feb 2010 SearchSecurity Best practices: Separation of duties for security administrators 12 Feb 2010 SearchSecurity Improving software with the Building Security in Maturity Model (BSIMM) 12 Feb 2010 ComputerWeekly.com Preventing phishing attacks: Enterprise best practices 10 Feb 2010 SearchSecurity Tips for writing secure SQL database code 03 Feb 2010 ComputerWeekly.com Single sign-on (SSO) authentication can help prevent password fatigue 28 Jan 2010 ComputerWeekly.com Increasing information security awareness in the enterprise 27 Jan 2010 ComputerWeekly.com How to develop a culture of security in the enterprise 13 Jan 2010 ComputerWeekly.com Code complexity analysis: How to keep it simple 13 Jan 2010 ComputerWeekly.com Creating and enforcing a clear-desk policy 23 Dec 2009 SearchSecurity How to prevent memory dump attacks 17 Dec 2009 ComputerWeekly.com Physical security threats: Don't gift your data away 16 Dec 2009 SearchSecurity How do hackers bypass a code signing procedure to inject malware 29 Nov 2009 ComputerWeekly.com SQL injection detection tools and prevention strategies 25 Nov 2009 ComputerWeekly.com Cross-site scripting explained: How to prevent XSS attacks 18 Nov 2009 ComputerWeekly.com TrueCrypt: How to get started with open source disk encryption 11 Nov 2009 SearchSecurity Preventing SQL injection attacks: A network admin's perspective 03 Nov 2009 SearchSecurity What is an encryption collision? 23 Oct 2009 SearchSecurity How to secure USB ports on Windows machines 23 Oct 2009 SearchSecurity What is the best database patch management process? 23 Oct 2009 ComputerWeekly.com The true test of a Web application patch 07 Oct 2009 ComputerWeekly.com Using OpenDNS in the enterprise 30 Sep 2009 ComputerWeekly.com Laptop security tips: The physical perspective 23 Sep 2009 1 2 3 4 5 6 7 8