NAT64 not supporting IPsec. I like to know how NAT64 gets the security offered by IPsec (authentication,Integrity and confidentiality). Is it possible to provide any security enhancement for NAT64 so that IPsec also can be used along with that?
Answer Question | June 18, 2013 1:50 PM
IPsec, NAT64, Security
How can I offer end-to-end security for NAT64 translation?
Answer Question | June 18, 2013 5:39 AM
While most of the discussion of Bring Your Own Device (BYOD) policy centers around security risks that come with giving the employees’ personal devices access to critical data and systems. One aspect of the issue that is not often raised is the potential for lowered productivity as users spend their time playing Words with Friends [...]
Answer Question | June 17, 2013 7:47 PM
Hi I have a really stupid question. I have 2 xLayer 2 switches (Cisco) and two routers connected to those switches. One routing to another network and the other to the internet. I want to setup OSPF to enter routes dynamically. They don’t want to pick-up neighbors unless they are directly connected. Any help will [...]
Answer Question | June 18, 2013 7:20 PM
Cisco, Layer 2 switches, OSPF
The recent revelation that the NSA collects massive amounts of user data from various technology companies has caused many IT pros to re-evaluate their user policies and data privacy tactics. Lessons learned from the NSA incursions include changing policies to make their systems and data less vulnerable. These new policies include revising NDA forms, looking [...]
Answer Question | June 18, 2013 7:47 PM
NSA, Privacy of Data, Security
In a Q&A keynote Tuesday at the 2013 Gartner Security and Risk Management Summit, Symantec CEO Steve Bennett noted that that no single vendor can offer an all-encompassing mobile security product portfolio. Instead, IT security vendors should cooperate to build a better ecosystem than attackers can, and focus less on competing for customers’ security budgets. [...]
Answer Question | June 18, 2013 8:46 PM
IT security, Symantec
What languages are virus’s most written in?
Answer Question | June 12, 2013 3:03 PM
“We don’t look out very well to the future…Without accountable leaders, I don’t think we’ll make much progress.” This was one of the powerful messages from Ret. U.S. Navy Admiral Michael G. Mullen, the former chairman of the Joint Chiefs of Staff, who stressed the importance of leadership and accountability to counter the threat of [...]
Answer Question | June 18, 2013 12:09 PM
After news broke of the U.S. National Security Agencies (NSA) access to information from a large segment of Internet traffic (social media and domestic companies), discussions about national security and online privacy issues have reached a new high. What do you think of the NSA programs that monitor Internet activity and phone records? Is it [...]
Answer Question | June 18, 2013 7:57 PM
cybersecurity, NSA, Privacy rights, Security
I have a network which is not external facing, that has been sub-contracted out so that I only interface with trusted networks,so I don’t believe that I need to have IDS/IPS above my existing firewalls. Is there any document/policy statement anywhere that defines that?
Answer Question | June 10, 2013 4:23 PM
IDS, IPS, Network, Policy, Security
When I click on the link where the magazine is suppose to be it takes me to a site index of tons of information. Thanks!
Answer Question | June 6, 2013 8:26 PM
Following the recent Project Blitzkrieg attacks (the reported series of financial fraud attacks against large U.S. banks) Nick Lewis offered several security measures that enterprises can utilize to fend off such attacks including: Requiring out-of-band confirmation of financial transactions Delaying suspect transactions by several days Denying transactions involving certain other banks Do you agree with [...]
Answer Question | June 18, 2013 8:19 PM
In domain, how do I block pen drive and allow access to Dongle? How to update GPO regarding above mentioned query?
Answer Question | June 4, 2013 6:32 AM
Dongle, Pen Drive
I decided to choose BYOD (bring your own device) for my master thesis but I couldn’t find any research work (Research Papers) done in this area. Only a lot of articles on the Internet. Please guide me how can I go further? What things should I include in my thesis or for literature survey? OR [...]
Answer Question | June 4, 2013 5:49 AM
BYOD, Consumerization, Security, Security policy
Bad news for security products as a recent survey by iViZ Security Inc., found that overall vulnerabilities in security products released in 2012 rose at a compound growth rate of an overwhelming 37.3% over the past three years. Antivirus products were #1, coming in with 49% of the software vulnerabilities reported while SQL injection was [...]
Answer Question | June 10, 2013 1:47 PM
Antivirus, Security, Security products
When using the Netgear router setup facility, under “wireless devices” I noticed a connected device labelled “Android” and I think someone has gotten past the security and is connected to the router and network. The guest network is not enabled. The network password is fairly strong and would not be easily broken. How do I [...]
Answer Question | June 10, 2013 2:01 AM
Netgear router, Security
In a recent survey by SearchCompliance, ‘security’ was cited by an overwhelming 96% of respondents as being among the top concerns regarding BYOD/consumerization of IT. Compliance came in as the second-ranked concern in the survey. That got us thinking…what are your top three BYOD concerns?
Answer Question | June 10, 2013 2:17 PM
BYOD, Consumerization, Security
Please any one assist me. We have a small office and I would like to advice my boss that we should find IT people to come and run computer servicing and maintenance as well anti-virus renew. Since we purchased our PCs, we have never done that. Kindly help me on how I can write a [...]
Answer Question | May 28, 2013 11:09 AM
What are some of the pros and cons to biometrics
Answer Question | May 25, 2013 2:55 AM
After the recent Spamhaus distributed denial-of-service attack, many DDoS service providers are concerned that targeted attacks are increasing along with bandwidth sizes. What should we do to minimize the threat of impending attacks?
Answer Question | June 4, 2013 12:15 PM