dcsimg

Articles by Paul Rubens 

7 Full Disk Encryption Solutions to Check out

Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.

How to Conduct Internal Penetration Testing

Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests.

How to Find the Right Penetration Testing Company

A penetration test is only as good as the company conducting it. Here is everything you need to know to find the right penetration testing company.

How to Get Identity Authentication Right

Identity authentication is especially important for high-value transactions, so it is important to get it right.

6 Ways to Make IAM Work for Third-Party Organizations

Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.

Everything You Need to Know about NGFW

Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.

What the Heck Is a CASB, and Do You Need One?

Cloud access security brokers are a relative newcomer to the enterprise, but cloud security concerns will drive rapid adoption of CASBs.

Top 10 Ways to Secure a Windows File Server

Have you hardened your Windows file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

5 Key New Features in Nmap Network Security Tool

The open source network security tool's latest version offers significant improvements.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

Do APIs Pose a Security Risk?

APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.

Cyber War Is Hell

Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.

Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.

Static Analysis Can 'Score' Software Security

Static analysis can be even more effective in improving software security if it is used to create quality metrics.

Windows Server 2003: No Support, No Security?

What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?

Do Threat Exchanges Work?

Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?