- Network Security: Tools, Products, Software
- Network Protocols and Security
- Secure VPN Setup and Configuration
- Network Intrusion Detection and Analysis
- Wireless Network Security: Setup and Tools
- NAC and Endpoint Security Management
Email Alerts
-
Defense in Depth 2.0
This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.Video
-
Lumension adds to its endpoint security products with EIC
Lumension announced the Endpoint Intelligence Center to protect endpoint computers from threats, malware and third-party software vulnerabilities.Article | 14 Feb 2011
-
Software-defined networking: Exploring SDN security pros and cons
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs.Tip
-
Remote Desktop Protocol security: How to secure RDP network endpoints
What is RDP and why does it pose a security threat? Expert Matt Pascucci explains why it’s needed and how best to secure RDP it in the enterprise.Tip
-
Gartner's Greg Young on enterprise IPv6 security issues
Video: Gartner Research VP Greg Young discusses enterprise IPv6 security issues, including why IPv6 transitions introduce new risks.Video
-
Network Security Technologies
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network monitoring and forensics technology.partOfGuideSeries
-
Free or paid antivirus: Effective enterprise antivirus at no cost?
When looking for effective enterprise antivirus software, does it matter whether it is free or paid antivirus? Yes it does, says expert Michael Cobb.Tip
-
Analysis: Vast IPv6 address space actually enables IPv6 attacks
For World IPv6 Launch Day 2012, Fernando Gont covers why common ways of generating IPv6 addresses actually make an attacker’s job easier.Tip
-
The switch to HTTPS: Understanding the benefits and limitations
Expert Mike Cobb explains the value and limitations of HTTPS, and why making the switch to HTTPS may be easier than it seems.Answer
-
Use Telnet alternative SSH to thwart Telnet security risks
The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place.Answer
-
RSA 2012 talk to offer help understanding IPv6 security issues
Understanding IPv6 security issues can be a challenge, but the protocol's co-inventor says enterprises can no longer afford to ignore IPv6 security concerns.News | 22 Feb 2012
-
BIOS management best practices: BIOS patches and BIOS updates
Amid growing concern over BIOS threats, expert Mike Cobb discusses how organizations should manage BIOS patches and BIOS updates.Answer
- VIEW MORE ON : Network Protocols and Security
-
wildcard certificate
A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.Definition
-
PDF download: Information Security magazine October 2012
In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape.Magazine
-
security event (security incident)
A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.Definition
-
security information and event management (SIEM)
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Definition
-
Computer Security Incident Response Team (CSIRT)
A Computer Security Incident Response Team (CSIRT) is a group of professionals that receives reports of security breaches, conducts analyses of the reports and responds to the senders.Definition
-
Cisco SecureX strategy gets boost with application-aware firewall
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.News | 28 Feb 2012
-
Best intrusion detection/prevention products 2011
Readers choose the best intrusion detection/prevention products.Magazine
-
network intrusion protection system (NIPS)
A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.Definition
-
Defense in Depth 2.0
This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.Video
-
Hacktivism examples: What companies can learn from the HBGary attack
A few simple security best practices may have spared security company HBGary Federal from the recent attack by the hacktivist group Anonymous. Nick Lewis explains what happened and how to prevent such an attack against your company.Tip
-
BYOD (bring your own device)
BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger trend of IT consumerization, in which consumer software and hardware are being brought into the enterprise.Definition
-
How can solution providers augment BlackBerry PlayBook security?
Expert Lisa Phifer explains how to help customers with PlayBook Security, and reveals future PlayBook enterprise features.Tip
-
Network Security Technologies
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network monitoring and forensics technology.partOfGuideSeries
-
Quiz: Endpoint security pitfalls to avoid
This quiz tests your ability to avoid common endpoint control pitfalls that many others have learned to hard way.Quiz
-
Securing Android devices with a mobile device security policy
Secure employee-liable Android devices with workable security policies that discover, enroll, protect and monitor all Android endpoints.Tip
-
Antimalware product suites: Understanding capabilities and limitations
Traditional antivirus tools have matured into multi-featured antimalware suites. Here’s what you should know when shopping for endpoint protection.Magazine
-
Best antimalware products 2011
Readers rank the best antimalware products.Magazine
-
IT consumerization drives new security thinking
The influx of personal smartphones and other computing devices into the enterprise is forcing a shift in security strategy.Magazine
-
Smartphone encryption, authentication ease mobile management
New security tools allow companies to extend encryption and authentication to mobile devices.Magazine
-
Trend Micro announcements aimed at data security protection
Trend Micro made a series of announcements including new products for preventing data loss at the endpoint, endpoint encryption, an email scanner and a data protection service.Article | 17 Feb 2011
-
Microsoft security proposal is noble, but no way
To cure the botnet plague, Microsoft wants to quarantine infected consumer PCs until they're remediated.Feature
-
Tradeoffs and advantages of network access control with Microsoft NAP
Microsoft NAP's endpoint security policy compliance checks and integration with third-party security products make it an attractive option over traditional network access control solutions.Tip