Email Alerts
-
With SSL VPNs on the offense, will IPSec VPNs eventually be benched?
In month’s Information Security magazine, SSL VPNs are providing their customers cheaper secure remote log ons, but will they take it to the next level with IPsec? Also inside this issue, get a behind-the-scenes look at Microsoft’s Patch Tuesday and ... E-Zine
-
Network Security Technologies
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network monito... partOfGuideSeries
-
IPv6 tutorial: Understanding IPv6 security issues, threats, defenses
You may not know it, but IPv6 may be the Internet's next superhighway for zero-day attacks. This new guide offers tactics for proactive IPv6 security. Tutorial
-
Secure VoIP tutorial: Understanding VoIP security best practices
More organizations are choosing to implement VoIP telephony in the enterprise for its cost savings. However, securing the technology comes with its own price tag. This secure VoIP tutorial is a compilation of resources that review VoIP security best ... Learning Guide
-
Voice over IP Security: VoIP Threat Taxonomy
In an excerpt from Voice over IP Security, author Patrick Park reviews VoIP threats, including spam, phishing and other threats against social context. Book Chapter
-
Securing VoIP Networks: Threats, Vulnerabilities and Countermeasures
In an excerpt from the book Securing VoIP Networks: Threats, Vulnerabilities and Countermeasures, authors Peter Thermos and Ari Takanen discuss the strengths and weaknesses of SRTP. Book Chapter
-
Man-in-the-middle attacks
This excerpt from Chapter 2 of "Securing Storage: A Practical Guide to SAN and NAS Security" examines how man-in-the-middle attacks affect Fibre Channel security and examines how to determine if your organization is at risk. Book Chapter
-
VoIP protocols: A technical guide
This guide reviews the two main protocols that power VoIP -- Session Initiation Protocol (SIP) and H.323 -- and their known vulnerabilities, as well as how functional protocol testing ("fuzzing") can help defeat such problems. SearchSecurity Technical
-
VoIP protocol insecurity
SearchSecurity Technical
-
Understanding VoIP protocols
SearchSecurity Technical
-
How to use fuzzing to deter VoIP protocol attacks
SearchSecurity Technical
- See more Essential Knowledge on Network Protocols and Security
-
Go Daddy responding to malicious DNS entries
Weak passwords may be enabling attackers to hack the DNS records of some Go Daddy hosted websites to spread ransomware. News | 26 Nov 2012
-
RSA 2012 talk to offer help understanding IPv6 security issues
Understanding IPv6 security issues can be a challenge, but the protocol's co-inventor says enterprises can no longer afford to ignore IPv6 security concerns. News | 22 Feb 2012
-
Tools, services emerge for enterprise DNSSEC adoption
Tools, services and support are available, but experts believe a watershed moment is what is needed to push enterprises into DNSSEC adoption. News | 12 Jan 2012
-
ISC issues temporary patch for zero-day BIND 9 DNS server flaw
A temporary patch has been released for BIND 9 DNS servers, mitigating a zero-day vulnerability causing server crashes. It's unclear if exploits are in the wild. News | 17 Nov 2011
-
IBM researchers push for secure open wireless networks
IBM’s Secure Open Wireless method could secure public Wi-Fi networks automatically and prevent attackers from snooping and stealing users’ data. News | 19 Aug 2011
-
Black Hat 2011: Dan Kaminsky reveals network security research topics
Noted researcher Dan Kaminsky presented his latest network security research topics, including vulnerabilities in P2P networks, UPNP and home routers. News | 03 Aug 2011
-
WAN managers share their IPv6 migration strategies on World IPv6 Day
SearchEnterpriseWAN.com asked WAN managers about where they stand today with their IPv6 migration strategies as well as their thoughts on World IPv6 Day. News | 08 Jun 2011
-
IPv6 security challenges and concerns
Andy Champagne, an engineer at Akamai Technologies discusses some of the security issues and threats posed by the transition to IPv6 and explains why enterprises need to begin planning now. News | 08 Jun 2011
-
Lagging IPv6 security features, vulnerabilities could hamper transition
Experts say suspect IPv6 security features in commercial products and weaknesses in the protocol could be exploited by attackers. News | 07 Jun 2011
-
IPv6 connectivity: Innovations address IPv6 security concerns
Researchers at Virginia Tech have created a tool called Moving Target IPv6 Defense in order to address looming IPv6 security issues. Column | 19 May 2011
- See more News on Network Protocols and Security
-
Software-defined networking: Exploring SDN security pros and cons
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs. Tip
-
Remote Desktop Protocol security: How to secure RDP network endpoints
What is RDP and why does it pose a security threat? Expert Matt Pascucci explains why it’s needed and how best to secure RDP it in the enterprise. Tip
-
Free or paid antivirus: Effective enterprise antivirus at no cost?
When looking for effective enterprise antivirus software, does it matter whether it is free or paid antivirus? Yes it does, says expert Michael Cobb. Tip
-
Analysis: Vast IPv6 address space actually enables IPv6 attacks
For World IPv6 Launch Day 2012, Fernando Gont covers why common ways of generating IPv6 addresses actually make an attacker’s job easier. Tip
-
Modern security management strategy requires security separation of duties
Contributor Matthew Pascucci argues that enterprises need security separation of duties to ensure an effective, modern security management strategy. Tip
-
How to avoid VoIP security risks: Forrester’s six-step process
If left unprotected, VoIP security risks pose a threat to corporate data. Learn how to secure VoIP systems with Forrester’s six-step process. Tip
-
VoIP security best practices: Securing communication in the workplace
VoIP communications can be a great money-saver, but without solid VoIP security best practices, it can introduce new risks. Tip
-
Requirements for secure IPv6 deployments include better IPv6 tester tools
More staff training, industry research and improved IPv6 tester tools are essential for secure IPv6 deployments in the enterprise. Expert Fernando Gont explains why. Tip
-
IPv6 myths: Debunking misconceptions regarding IPv6 security features
Aggressive marketing has helped perpetuate a number of security-related IPv6 myths. Expert Fernando Gont helps separate myth from fact to ensure a secure IPv6 deployment. Tip
-
Thwarting a hacktivist: How to avoid sociopolitical IT security attacks
Is your enterprise a significant hacktivist target? Learn how to determine whether your enterprise is more likely to be attacked. Tip
- See more Tips on Network Protocols and Security
-
How enterprises should address the latest Skype security concerns
A Web-based tool has exposed some serious Skype security concerns. Expert Michael Cobb discusses the options for organizations that rely on Skype. Answer
-
The switch to HTTPS: Understanding the benefits and limitations
Expert Mike Cobb explains the value and limitations of HTTPS, and why making the switch to HTTPS may be easier than it seems. Answer
-
Use Telnet alternative SSH to thwart Telnet security risks
The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place. Answer
-
BIOS management best practices: BIOS patches and BIOS updates
Amid growing concern over BIOS threats, expert Mike Cobb discusses how organizations should manage BIOS patches and BIOS updates. Answer
-
Does Morto worm prove inherent flaws in Windows RDP security?
The recent Morto worm had unusual success spreading via Windows Remote Desktop Protocol. Does that mean RDP is security too weak? Nick Lewis explains. Answer
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Answer
-
How to secure websites using the HSTS protocol
Learn how to use HTTP Strict Transport Security (HSTS) to secure websites and how HSTS prevents man-in-the-middle attacks. Answer
-
How DHCP works and the security implications of high DHCP churn
Learn about the potential problems with high DHCP churn and whether it should be a concern to your organization. Answer
-
How MAC and HMAC use hash function encryption for authentication
Hash function encryption is the key for MAC and HMAC message authentication. See how this differs from other message authentication tools from expert Michael Cobb. Answer
-
How to set up SFTP automation for FTP/DMZ transfer
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Answer
- See more Expert Advice on Network Protocols and Security
-
smurfing
A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service. Definition
-
IP spoofing (IP address forgery or a host file hijack)
IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. The hijacker obtains the IP address of a legitimate ho... Definition
-
IGP (Interior Gateway Protocol)
An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks). Definition
-
5 terms you need to know before you employ VoIP
Learn five important terms every organization should understand before deploying Voice over IP (VoIP) telephony. Definition
-
digest authentication
Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller... (Continued) Definition
-
Secure Sockets Layer (SSL)
SSL (Secure Sockets Layer) is a commonly-used protocol for managing the security of a message transmission on the Internet; it uses a program layer located between the Internet's HTTP and TCP program layers. Definition
-
Transport Layer Security (TLS)
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. Definition
-
Gartner's Greg Young on enterprise IPv6 security issues
Video: Gartner Research VP Greg Young discusses enterprise IPv6 security issues, including why IPv6 transitions introduce new risks. Video
-
Black Hat 2011: SSL implementations are broken, says noted security researcher
Configuration issues and other errors mire the SSL implementations of thousands of legitimate websites, according to research conducted by SSL Labs, a research arm of Qualys Inc. Video
-
VeriSign CSO on new IPv6 threats, Internet stability and security
VeriSign CSO Danny McPherson talks about the new threats posed by the move from IPv4 to IPv6 and the issues hindering the the adoption of the next Internet protocol. Video
-
Incident response team best practices
Do you know how to maximize your incident response management? Expert Lenny Zeltser discuses incident response best practices for policies, maturity and teams in this interivew. Video
-
VeriSign on DNSSEC support
Joe Waldron, a product manager in VeriSign's Naming (DNS) Group, said engineers are testing and upgrading systems to support security extensions for DNS (DNSSEC). Video
-
PCI compliance requirement 4: Encrypt transmissions
Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 4: "Encrypt transmission of cardholder data across open, public networks." Video
-
Balancing security and performance: Protecting layer 7 on the network
This video will explain options for securing application-layer traffic using network security technologies, architectures and processes, including Layer 7 switches, firewalls, IDS/IPS, NBAD and more. Video
-
Go Daddy responding to malicious DNS entries
Weak passwords may be enabling attackers to hack the DNS records of some Go Daddy hosted websites to spread ransomware. News
-
How enterprises should address the latest Skype security concerns
A Web-based tool has exposed some serious Skype security concerns. Expert Michael Cobb discusses the options for organizations that rely on Skype. Answer
-
Software-defined networking: Exploring SDN security pros and cons
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs. Tip
-
Remote Desktop Protocol security: How to secure RDP network endpoints
What is RDP and why does it pose a security threat? Expert Matt Pascucci explains why it’s needed and how best to secure RDP it in the enterprise. Tip
-
Gartner's Greg Young on enterprise IPv6 security issues
Video: Gartner Research VP Greg Young discusses enterprise IPv6 security issues, including why IPv6 transitions introduce new risks. Video
-
Network Security Technologies
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network monito... partOfGuideSeries
-
Free or paid antivirus: Effective enterprise antivirus at no cost?
When looking for effective enterprise antivirus software, does it matter whether it is free or paid antivirus? Yes it does, says expert Michael Cobb. Tip
-
Analysis: Vast IPv6 address space actually enables IPv6 attacks
For World IPv6 Launch Day 2012, Fernando Gont covers why common ways of generating IPv6 addresses actually make an attacker’s job easier. Tip
-
The switch to HTTPS: Understanding the benefits and limitations
Expert Mike Cobb explains the value and limitations of HTTPS, and why making the switch to HTTPS may be easier than it seems. Answer
-
Use Telnet alternative SSH to thwart Telnet security risks
The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place. Answer
- See more All on Network Protocols and Security
About Network Protocols and Security
Get advice on best practices for network protocols -- VoIP, TCP/IP, FTP. Learn how to protect data and secure communication to prevent hacker attacks.