dcsimg

Articles by Paul Rubens 

Top SIEM Vendors and Other Buying Advice

Security incident and event management (SIEM) products are no longer just for large enterprises. This article will help determine if SIEM is for you.

7 Database Security Best Practices

Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.

5 Freaky but Real Application Security Threats

There are some new application security threats in town, and they are pretty scary.

Patch Management Software Buyer's Guide

Patch management software automates patch management, one of the most important security tasks in any organization.

How to Encrypt a Flash Drive Using VeraCrypt

Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.

What Is SQL Injection and How Can It Hurt You?

Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.

7 Full Disk Encryption Solutions to Check out

Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.

How to Conduct Internal Penetration Testing

Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests.

How to Find the Right Penetration Testing Company

A penetration test is only as good as the company conducting it. Here is everything you need to know to find the right penetration testing company.

How to Get Identity Authentication Right

Identity authentication is especially important for high-value transactions, so it is important to get it right.

6 Ways to Make IAM Work for Third-Party Organizations

Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.

Everything You Need to Know about NGFW

Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.

What the Heck Is a CASB, and Do You Need One?

Cloud access security brokers are a relative newcomer to the enterprise, but cloud security concerns will drive rapid adoption of CASBs.

Top 10 Ways to Secure a Windows File Server

Have you hardened your Windows file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

10 Open Source Vulnerability Assessment Tools

Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

10 Open Source Security Breach Prevention and Detection Tools

The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.

5 Key New Features in Nmap Network Security Tool

The open source network security tool's latest version offers significant improvements.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?