Lisa Phifer

Lisa Phifer is president of Core Competence, a consulting firm focused on enterprise adoption of emerging network and security technologies. Lisa has been involved in the design, implementation and evaluation of networking, security and management products for 30 years.
21 Posts

5 Best Practices for Securing Remote Access

A decade ago, secure remote access was a right enjoyed by a privileged few: road warriors, executives,...

Top 5 PDF Risks and How to Avoid Them

In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47...

Top 10 Android Security Risks

Last year, Android became the world's second favorite mobile OS, racing past BlackBerry and Apple. 67 million of the nearly 300 million...

Top 10 Data Breaches of 2010

No organization wants to make breach headlines; many have spent considerable sums to...

Review: AirWatch Enterprise MDM for Apple iOS4

iPhones and iPads are flooding the workplace, threatening to dislodge IT-issued BlackBerries and...

Review: Astaro RED (Remote Ethernet Device)

Astaro RED (Remote Ethernet Device)Price:? $295 Pros:? Low TCO, zero-config, easily extends LAN security to small branches Cons:?Proprietary VPN, minimal reporting, troubleshooting...

10 Ways to Protect Yourself from Firesheep Attacks

Learn how to surf websites vulnerable to Firesheep without getting fleeced.Years after BlackHat sidejacking demos, far too many websites remain vulnerable to...

Top Ten Ways to Avoid an Evil Twin Attack

Wireless security concerns don't seem to be slowing hotspot growth. In 3Q09, AT&T hotspots serviced over 25 million Wi-Fi sessions – 66...

Review: MXI Stealth ZONE

MXI Security Stealth ZONE Secure USB Desktop Price:  $479 (on 8GB M500 drive)Pros:   Fast,...

Top 10 Email Malware Threats

A decade after Melissa, infected email messages are still rampant.Despite spam and malware...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...