We received a notice from NSA saying the specifics on how to handle our encryption program. The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption. The software uses [...]
Answer Question | April 18, 2013 5:18 PM
Encryption Software, FIPS, regulatory compliance, Secure Coding, Web Access Management
Hello, I am currently a student at the University of Advancing Technology and I am learning about security implementation frameworks this week. I was looking into a framework named Security Knowledge in Practice (SKiP) and I noticed some things about the framework and I wonder if anyone who has implemented it would agree. The Good: [...]
Answer Question | April 17, 2013 5:27 AM
Network security, Security, security framework, SKiP
With security breaches becoming more frequent, expert Michael Gregg looks at network security tools that no tester should be without. We would like to know….what’s the one network security tool that you can’t live without?
Answer Question | April 29, 2013 2:40 PM
Networking security, Security
I am a student at the University of Advancing Technology in Tempe, AZ. My class is learning more about the Plan-Do-Check-Act Implementation framework. The Harden/Secure step lists several steps that an administrator can take to ensure that a system is strengthened against known attacks, by eliminating vulnerabilities and other weaknesses commonly used by intruders. Of [...]
Answer Question | April 12, 2013 7:58 AM
Anti-malware, Security, Security best practices
The SSL certification process seems unnecessarily convoluted. How do you cut through the red tape when you need to get a new cert/re-certification?What resources are available to make sense of the process?
Answer Question | April 22, 2013 1:24 PM
Hello I want to take a back-up from our VNX (NAS). I start a test back-up and I found a problem. There are files who have only read permissions for the owner not for others. The solution is ACL’s i think. Do some of you have experience with VNX ACL’s
Answer Question | April 10, 2013 3:10 AM
ACL, permisions, VNX
Please help me in choosing how subject would be achieved to defend against hacker attack – especially against information theft and intruders. Critically compare and contrast the different methods (why should i choose certain than others) available…I need it for remote sites and main office.
Answer Question | April 7, 2013 10:55 PM
Security, Security management
External hard drive reads files on my Mac, but I can’t write files to it. I can on my PC but I can’t on my Mac, and it is compatible with both. I was able to read/write files to it on other Macs as new as mine in the past, but it won’t let me [...]
Answer Question | April 4, 2013 3:55 AM
External hard drives, Security, USB hard drives
How to open the Symantec Backup Catalog for Backup Folder Information.
Answer Question | April 3, 2013 11:48 AM
Symantec, Symantec Backup Exec
Je n’arrive pas à activer l’antivirus que j’ai acheté. Il y a toujours la mention “non activé” malgré mes nombreux téléchargements. Quel pourrait être le problème?
Answer Question | April 1, 2013 8:34 AM
Antivirus software, Norton
Hi, I want to take a network security course (CCNA, CCNP security) but present I am certified CCNA (r&s). I am working as a network engineer in a small company. I want to move in security domain. Is it good to know the knowledge about CCNP (r&S). Please give me a suggestion.
Answer Question | March 29, 2013 8:19 AM
CCNA, CCNP, Security careers
How do I delete this registry infection? The problem appears under the name ‘INTERACTIVE SERVICES DIALOG DETECTION’ and prevents printer function (in my case). I have tried using MS Config to eliminate unknown downloads but that didn’t work . Have tried several registry ‘cleaners’ without success.
Answer Question | March 26, 2013 4:08 PM
malware, SVCHost.exe, Windows Vista
Hello Everybody! I was wondering if I can get some suggestions of a good solution for bandwidth management in public open WiFi places. Starbucks for example, what is he using for restricting and controlling the internet connection and why its always good. I would really appreciate help, I tried radius from mikrotik and it doesn’t [...]
Answer Question | March 19, 2013 10:43 PM
Bandwidth management, Firewall, Internet, Internet connection
My son tells me that my Charter.net email does not use encryption. Is this more common or less common? Lee
Answer Question | March 18, 2013 5:52 PM
Encryption, Security, Security policies
I am looking for any documentation on deploying Windows 7 in a Single Sign-on(Kerberos) environment. Our XP’s work fine, but cannot get a single sign-on connection using Windows 7, 64 bit. We already have Kerberos deployed and working.
Answer Question | March 18, 2013 8:25 PM
Kerberos, Windows 7, Windows 7 Administration
We are a small company that is planning to move all of our servers to a datacenter. We will have 5 routable Public IP’s. We currently have the same at our office. Our current setup has a Comcast Business Gateway appliance with 3 FW’s connected to it. Each of the FW’s WAN port is set [...]
Answer Question | March 13, 2013 6:04 PM
Firewall, NAT, Network design, Static IP
With Jeep and Burger King becoming the recent victims of a hacker attack, cybersecurity has become the focus point for many enterprises and CIOs. What should CIOs do to counter the spread of cyber attacks? Can anything be done at all?
Answer Question | March 18, 2013 2:22 PM
Jeff Holleran, Blackberry’s senior director of enterprise product management, claims that the new Blackberry 10 operating system in conjunction with the BlackBerry Enterprise Service 10 provides the best mobile and BYOD system for both owners and companies. Do you think he’s right and do you believe Blackberry will be able to make significant inroads into [...]
Answer Question | March 18, 2013 2:17 PM
BlackBerry, BlackBerry 10, BYOD, Enterprise Security
During this year’s RSA Conference, security experts Ed Skoudis and Johannes Ullrich detailed how everything from an industrial control system to big financial institutions are vulnerable to a widespread cyber kinetic attack. Skoudis also expressed concerns that society continues to ignore the risks of these types of attacks. Do you think we’re prepared for a [...]
Answer Question | March 18, 2013 2:18 PM
With the transition to cloud email services like Gmail or Office 365, IT departments are facing new security issues. Has your company considered sandboxing your email client to lessen such security risks?
Answer Question | March 18, 2013 2:05 PM
Cloud Security, Cloud Services, Sandboxing, Security