Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity Life at the edge: Securing the network perimeter 05 Jun 2007 SearchSecurity What are the drawbacks to application firewalls? 31 May 2007 SearchSecurity What should be done with a RAID-5 array's failed drives? 31 May 2007 SearchSecurity How secure are document scanners and other 'scan to email' appliances? 30 May 2007 SearchSecurity How can header information track down an email spoofer? 02 May 2007 SearchSecurity Can keyloggers monitor mouse clicks and keyboard entries? 30 Apr 2007 SearchSecurity How to ensure that an SSL connection protects sensitive Web data 26 Mar 2007 SearchSecurity Are USB storage devices a serious enterprise risk? 25 Mar 2007 SearchSecurity Defending layer 7: A look inside application-layer firewalls 17 Mar 2007 SearchSecurity Dynamic code obfuscation: New threat requires innovative defenses 08 Mar 2007 SearchSecurity Windows Vista: Security issues to consider 27 Feb 2007 ComputerWeekly.com Securing the OSI Stack - Layer 5 25 Feb 2007 SearchITChannel Web application penetration testing: Best practices 21 Feb 2007 SearchSecurity What causes buffer overflows and memory leaks in a Web application? 20 Feb 2007 SearchSecurity Should full disk encryption be used to prevent data loss? 20 Feb 2007 SearchSecurity Is Sender ID an effective email authentication tool? 29 Jan 2007 SearchSecurity Do XPath injection attacks require the same response as SQL injections? 29 Jan 2007 SearchSecurity What are application logic attacks? 18 Jan 2007 SearchSecurity Will two different operating systems cause administrative problems? 17 Jan 2007 SearchSecurity How can rootkit hypervisors affect operating system security? 16 Jan 2007 SearchSecurity Using steganography for securing data, not concealing it 21 Dec 2006 SearchITChannel Filter network traffic with IPsec filtering rules 12 Dec 2006 SearchITChannel Performing a network security vulnerability assessment with Nmap 10 Dec 2006 SearchITChannel Using Nmap XML and HTML parsers to generate output for easy analysis 08 Dec 2006 SearchSecurity When choosing a digital certificate, how important is the expiration period? 01 Dec 2006 SearchSecurity For asset management systems, is there a tool more comprehensive than Nmap? 01 Dec 2006 SearchSecurity Which Internet protocol is more secure: FTPS or SCP? 30 Nov 2006 SearchSecurity How simple steps ensure database security 16 Nov 2006 SearchSecurity What tools are available to verify a patch's validity? 19 Oct 2006 SearchSecurity How to secure an e-commerce Web site 19 Oct 2006 SearchSecurity Nmap Technical Manual 17 Oct 2006 SearchSecurity If email attachments are sent via SSL will they be encrypted? 13 Oct 2006 SearchSecurity What is the average cost of an MSSP? 13 Oct 2006 SearchSecurity Nmap and the open source debate 10 Oct 2006 SearchSecurity Nmap parsers and interfaces 26 Sep 2006 SearchSecurity Can email header information be used to track down spoofers? 26 Sep 2006 SearchSecurity How to selectively block instant messages 25 Sep 2006 SearchSecurity The strengths and weaknesses of PKI and PGP systems 22 Sep 2006 SearchSecurity Ajax security: How to prevent exploits in five steps 14 Sep 2006 SearchSecurity Interpreting and acting on Nmap scan results 12 Sep 2006 SearchSecurity Techniques for improving Nmap port scan times 14 Aug 2006 SearchSecurity The pros and cons of data wiping 08 Aug 2006 SearchSecurity How to create an optional login for the same application 08 Aug 2006 SearchSecurity Nmap: Firewall configuration testing 24 Jul 2006 SearchSecurity Five freeware tools for mitigating network vulnerabilities 10 Jul 2006 SearchSecurity Nmap: More port scanning techniques 26 Jun 2006 SearchSecurity Nmap: How to scan ports and services 20 Jun 2006 SearchSecurity Are there any patch management products that track the patching process? 13 Jun 2006 SearchSecurity Use SHA to encrypt sensitive data 12 Jun 2006 SearchSecurity How to install and configure Nmap on Linux 05 Jun 2006 SearchSecurity Preventing blind SQL injection attacks 01 Jun 2006 SearchSecurity IIS security: Configure Web server permissions for better access control 22 May 2006 SearchSecurity How to install and configure Nmap for Windows 19 May 2006 SearchSecurity Nmap: A valuable open source tool for network security 15 May 2006 SearchSecurity HTTP attacks: Strategies for prevention 13 Apr 2006 SearchSoftwareQuality Penetration testing best practices 14 Mar 2006 SearchSecurity Best practices for pen testing Web applications 08 Mar 2006 SearchSecurity Application development best practices 14 Feb 2006 SearchSecurity Patch management techniques 07 Feb 2006 SearchSecurity How e-mail message components are used 07 Feb 2006 SearchSecurity How VPNs interact with instant-messaging applications 06 Feb 2006 SearchSecurity The pros and cons of proxy firewalls 06 Feb 2006 SearchSecurity What's new in the revision of ISO 17799 03 Feb 2006 SearchSecurity How to use IPsec filtering rules to filter network traffic 11 Jan 2006 SearchSecurity The pros and cons of FTP over SSL 30 Dec 2005 SearchSecurity Web application variable manipulation 28 Dec 2005 SearchSecurity Proxy server functions 21 Dec 2005 SearchSecurity Why form fields aren't a good place to hide sensitive information 21 Dec 2005 SearchSecurity How buffer-overflow vulnerabilities occur 12 Dec 2005 SearchSecurity How RSA keys differ from DH/DSS keys 08 Dec 2005 SearchSecurity Best practices for managing secure Web server configurations 07 Dec 2005 SearchSecurity How to prevent application attacks and reduce network vulnerabilities 06 Dec 2005 SearchSecurity How different DBMSes implement Internet database security 28 Nov 2005 SearchSecurity Five common application-level attacks and the countermeasures to beat them 22 Nov 2005 SearchSecurity How to keep your data and database secure 21 Nov 2005 SearchSecurity MD5 vs. RC4 16 Nov 2005 SearchSecurity Securing Web apps against authenticated users 31 Oct 2005 SearchSecurity The pros and cons of reformatting a hard drive 23 Oct 2005 SearchSecurity Patch deployment timeline 23 Oct 2005 SearchSecurity The future of Telnet and FTP 23 Oct 2005 SearchSecurity Protect your Web site against path traversal attacks 19 Oct 2005 SearchSecurity How to prevent the risks of client-side caching 10 Oct 2005 SearchSecurity Using secure MIME (S/MIME) for securing email 20 Sep 2005 SearchSecurity The pros and cons of application firewalls 08 Sep 2005 SearchSecurity How to prevent drive corruption in the event of power failure 08 Sep 2005 SearchSecurity Malware signature updates 08 Sep 2005 SearchSecurity Digital certificates and webmail 07 Sep 2005 SearchSecurity Encryption detection 07 Sep 2005 SearchSecurity How to configure an FTP server with SSL 18 Aug 2005 SearchSecurity Storing hashed, encrypted values in a database 08 Aug 2005 SearchSecurity Testing a security patch 04 Aug 2005 SearchSecurity How to use SMTP relay service to keep spammers away from Exchange Server 01 Jun 2005 1 2 3 4 5 6 7 8