Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
When Patch Tuesday is patchless
Patch Tuesday came and critical patches were few and far between. What should you do? Use this time to get other products up-to-date. This checklist helps you get started. Continue Reading
Automating the patch installation process
In this Ask the Expert Q&A, our platform security expert discusses how to control patch installations for Microsoft applications. He also explains where to find resources that will help you manage this process. Continue Reading
Should a firewall ever be placed before the router?
In terms of unit cost, it's generally much cheaper for a router to handle a packet than for a firewall to analyze it. But as network security expert Mike Chapple explains, one does not necessarily have to be placed before the other. Continue Reading
-
How can I retrieve and restore a deleted user account in Active Directory?
When working with a directory service like Active Directory, restoring deleted users can be challenging. Identity and access management expert Joel Dubin advises on how to manage users efficiently. Continue Reading
Windows Update attacks: Ensuring malware-free downloads
Attackers recently discovered how to exploit the Windows Update service to push malware onto targeted systems. Is the new attack possible because of a flaw in Windows Update itself? Or is it because users just aren't being careful? Michael Cobb ... Continue Reading
How to restrict traffic between the VPN server and remote Cisco clients
Setting up a VPN tunnel between a Cisco PIX server and remote clients does not always go smoothly. In this expert Q&A, Mike Chapple reviews how careful management of commands and access control lists can successfully restrict user access.Continue Reading
When filling out the PCI DSS questionnaire, is it important to provide documentation?
It's time to fill out the PCI DSS questionnaire, but management has said that it's no big deal, there's no need to provide accompanying documentation. But what will happen when an auditor comes knocking? Security management expert Mike Rothman ...Continue Reading
Will the features of Windows Vista SP1 encourage wider adoption of the OS?
Platform security expert Michael Cobb explains the benefits and drawbacks of Windows Vista Service Pack 1.Continue Reading
Nipper audits routers, reveals insecure settings
In this column, contributor Scott Sidel examines Nipper, a network infrastructure parser that helps security professionals keep routers and firewalls properly configured.Continue Reading
How should a company's security program define roles and responsibilities?
In many organizations, it's not uncommon for physical, legal and information security departments to step on each other's toes. In this expert Q&A, security management pro Shon Harris reveals how a CSO can bring these teams together and implement a ...Continue Reading
-
How to revoke and delete Active Directory user certificates
In this Ask the Expert Q&A, our identity and access management expert examines how to set up Active Directory autoenrollment feature to revoke and delete user certificates on the Certificate Authority (CA) automatically.Continue Reading
Microsoft NAP/TNC alliance brings new dimension to network access control decisions
In the past, looming interoperability issues have kept security professionals from adopting a network access control tool. Just a few months ago, however, Microsoft announced its intention to make the company's Network Access Protection product ...Continue Reading
Best practices for purchasing an intrusion detection device
In this SearchSecurity.com Q&A, security management expert Mike Rothman offers guidelines for buying an intrusion detection (IDS) device.Continue Reading
The pros and cons of outsourcing antivirus services
Learn the pros and cons of outsourcing antivirus services in this tip by Ed Skoudis.Continue Reading
IPsec tunneling: Exploring the security risks
As part of his monthly responses to readers, Mike Chapple reveals some information about VPNs that many may not want to hear.Continue Reading