Paul Rubens - Article Archives - Page 4

Internet of Things a Potential Security Disaster

September 4, 2014
Experts believe the Internet of Things will be highly insecure, at least in the early days.
READ MORE

Mobile Device Management: The Buying Basics

August 22, 2014
Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.
READ MORE

Are TrueCrypt Users Screwed?

July 16, 2014
When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.
READ MORE

Hackers Using DDoS to Distract Infosec Staff

June 19, 2014
Hackers are increasingly using DDoS attacks as a kind of 'smokescreen' that helps them carry out data breaches.
READ MORE

Are Anti-Malware's Days Numbered?

May 30, 2014
Anti-malware software can't spot all malicious code. Is  isolating end-user tasks through virtualization a better approach to security?
READ MORE

Managed Security Services' Role in Cloud Security

May 27, 2014
A managed security service provider (MSSP) is a good option for cloud security, say experts.
READ MORE

How to Buy Static Analysis Tools

May 2, 2014
Static analysis tools can help software developers produce more secure applications. Here is what you need to know when evaluating such tools for your organization.
READ MORE

3 Tools for Enforcing Password Policies

March 27, 2014
User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?
READ MORE

10 Bitcoin Security Tips

February 10, 2014
Bitcoins have the potential to revolutionize business payment transactions. But they also have some security shortcomings. Here are 10 tips for keeping Bitcoins secure.
READ MORE

6 Tips for Stronger Encryption

January 23, 2014
In the wake of revelations about NSA backdoors in encryption systems, organizations must do everything they can to ensure their encryption is as strong as possible.
READ MORE

7 Security Trends to Expect in 2014

December 18, 2013
From increasingly sophisticated DDoS attacks to stuxnets to insider threats, companies have plenty to worry about when it comes to enterprise security in 2014.
READ MORE

13 Hot Security Startups to Watch

November 13, 2013
There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.
READ MORE

White Hats for Hire Find Software Bugs

November 8, 2013
Companies that lack the resources to run their own bug bounty programs may want to consider a bug bounty as a service program.
READ MORE

How Big Data Analytics Can Boost Network Security

August 26, 2013
While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.
READ MORE

Digital Certificate Dangers, and How to Fight Them

August 8, 2013
While digital certificates play a vital security role, they also present security risks. A certificate management system is a good way to mitigate many of those risks.
READ MORE

Will PRISM Impact Data Protection Strategies?

June 25, 2013
As details of the National Security Agency's PRISM program continue to emerge, how concerned should enterprises be about government requests for data?
READ MORE

4 Tips for Cloud Compliance

June 12, 2013
Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
READ MORE

BYOD Fuels NAC Comeback

April 11, 2013
The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.
READ MORE

6 Emerging Security Threats, and How to Fight Them

March 25, 2013
Hackers are nothing if not creative, so it's important for enterprise security pros to educate themselves about emerging security threats like these six.
READ MORE