• Have the NSA revelations caused your company to rethink its policies?

    The recent revelation that the NSA collects massive amounts of user data from various technology companies has caused many IT pros to re-evaluate their user policies and data privacy tactics.  Lessons learned from the NSA incursions include changing policies to make their systems and data less...

    Chris Leonard4,300 pointsBadges:
  • What’s the best way to deliver results for enterprise customers?

    In a Q&A keynote Tuesday at the 2013 Gartner Security and Risk Management Summit, Symantec CEO Steve Bennett noted that that no single vendor can offer an all-encompassing mobile security product portfolio. Instead, IT security vendors should cooperate to build a better ecosystem than attackers...

    Chris Leonard4,300 pointsBadges:
  • What type of leadership would be most successful against the threat of cyber-attacks?

    "We don't look out very well to the future…Without accountable leaders, I don't think we'll make much progress." This was one of the powerful messages from Ret. U.S. Navy Admiral Michael G. Mullen, the former chairman of the Joint Chiefs of Staff, who stressed the importance of leadership and...

    Michael Tidmarsh28,445 pointsBadges:
  • Master thesis subject – an idea?

    Hi all, I am in the last year of my master program in Information Security and I have to find a subject for my master thesis with focus on Information Security. Anyone any idea? Thank you very much,

    Pupincurist25 pointsBadges:
  • Exposure on the Internet

    How can I remove myself from being found on the Internet? I have followed all procedures but my name can still be queried.

    weglowde40 pointsBadges:
  • ISA Server 2004 user bandwidth

    How can I manage bandwidth on user basis or machine basis. I want to limit user a to download not more than 50 MB per day and user b 10 mb per day. Also I want to impose connectivity restriction i.e. 10Kbps per user out of 1 Mbps of my bandwidth.

    Maqusman20 pointsBadges:
  • Security enhancement in NAT64

    NAT64 not supporting IPsec. I like to know how NAT64 gets the security offered by IPsec (authentication,Integrity and confidentiality). Is it possible to provide any security enhancement for NAT64 so that IPsec also can be used along with that?

    GODIS2G2D10 pointsBadges:
  • How should an enterprise prepare for a Project Blitzkrieg-style attack?

    Following the recent Project Blitzkrieg attacks (the reported series of financial fraud attacks against large U.S. banks) Nick Lewis offered several security measures that enterprises can utilize to fend off such attacks including: Requiring out-of-band confirmation of financial transactions...

    Michael Tidmarsh28,445 pointsBadges:
  • NAT64 end-to-end security

    How can I offer end-to-end security for NAT64 translation?

    GODIS2G2D10 pointsBadges:
  • VPN configuration

    Dear members, I have a Cisco ASA 5520 firewall. I want connected to another location for VPN. The another end have only for Jupiter ns-25 devise. Its possible to connect VPN. What is the iOS that will be required for both end? What are the authentication and encryption methods will be support?...

    Franklinlobo5 pointsBadges:
  • LAN connectivity problem with Compaq notebook

    I have a Compaq EVO n1020v notebook. This works fine in our office LAN and sometimes it does not at all. Office LAN is a workgroup with ICS enabled in win 2K server. If I check the IP of the notebook it shows the IP of the LAN but never connects to the internet, can't access LAN...

    BinooDas123410 pointsBadges:
  • SMTP transmission failure has occurred using Exchange 2003 and Trend Micro IMSS

    Dear Sir, We use Exchange 2003 and Trend Micro IMSS 7.x, sometimes messages are bouncing back to the sender. Please refer to the email below which I sent from my Gmail account to my company account and it bounces back. Kindly assist, Thanks and regards, Ziad Diagnostic code: smtp;552...

    Zsababa5 pointsBadges:
  • CCNA Security vs CCNA Voice vs CCNA Wireless

    Hi guys, Please guide me to choose among CCNA Security , CCNA Voice, CCNA Wireless. By the way I am having CCNA certification. Bit confused to choose next career step. Please help me out. Thanks in advance.

    dprasannakumar1325 pointsBadges:
  • CCNA career

    Hi All, This is the first time that I am submitting my question to this website. I hope I would get best suggestion. I am from non-technical background. Currently I am working with a MNC in non-technical field. Now I want to pursue my career in IT field. Since I am from non-technical background I...

    13035 pointsBadges:
  • Upgrading with Windows 2003 Server

    We have 10 WIN2K servers in our environment. 3 of these servers are domain controllers. The rest are member servers. We would like to upgrade with WIN2003 server. Does any one have any tips or pointers on how to go about this task. Is the upgrade process straight forward or should we think about...

    Crackerjack50 pointsBadges:
  • Virus

    What languages are virus's most written in?

    guslepe265 pointsBadges:
  • Relational design in database

    What does it mean when we say relational schema is best described as being in Boyce-Codd Normal Form?

    Djmace0 pointsBadges:
  • Free remote access desktop application?

    Is there any free remote desktop access application?

    Zeropoint5 pointsBadges:
  • What is IPSec? How to config frame relay?

    How to config the frame relay? with brief example (using all configuration)

    Kaja20048055 pointsBadges:
  • Disconnect an unauthorized wireless device

    When using the Netgear router setup facility, under "wireless devices" I noticed a connected device labelled "Android" and I think someone has gotten past the security and is connected to the router and  network. The guest network is not enabled. The network password is fairly strong and would not...

    Bob3715 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following