Search Results | Network security
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Procedures for a new area

Answer  We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can recom...

Last updated: May 23, 2007   10:13 PM GMT   |    Access control, Application security, backdoors
Security implications surrouding outbound SSH traffic

Answer  The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port forwar...

Last updated: Dec 5, 2013   6:28 PM GMT   |    Port knocking, Security, SSH
Juniper launches mobile security suite

Blog  Juniper Networks on Tuesday unveiled a software suite that company executives touted as the first product to provide integrated security and secure connectivity across all types of mobile devices. The Junos Pulse Security Suite includes antivirus, antispam, a personal firewall, device monitoring an...

Last updated: Oct 26, 2010   10:16 PM GMT  |  Blog: Security Bytes
SAS70 audit exceptions

Blog   As I have read many SAS 70 audit reports, my perception of the quality of audit reports is varied. As I stated in previous blogs, there are different standards with which to use to implement information technology controls; however, the SAS70 standard does not require an auditor to meet specific...

Last updated: Jul 29, 2008   11:51 PM GMT  |  Blog: SAS 70
Cisco Network Academy has enrolled its 1 millionth student

Blog   According to Cisco, Cisco Network Academy has enrolled its 1 millionth student for the first time. The Cisco Network Academy offers the program in partnership with educational institutions, government administrations and community based organizations globally and delivers information and communi...

Last updated: Mar 30, 2011   7:20 AM GMT  |  Blog: Network technologies and trends
Trans-border Communication Protection - Part III

Blog  Generally, a VPN is recognized as a confidential data plexus that employs the public telecommunication infrastructure while maintaining privacy through the utilization of a tunneling protocol and security procedures. A VPN can provide remote offices and telecommuters with secure access to the connec...

Last updated: Jul 2, 2009   8:12 PM GMT  |  Blog: IT Governance, Risk, and Compliance
What is Cisco IOS Software Checker?

Blog  We are all leaving in the age, where Network Security is given upmost importance; almost every major Organization does have a good Security team who are even responsible for looking at the vulnerabilities reported in their Network Security products. Cisco does have a great tool called Cisco IOS Sof...

Last updated: May 25, 2015   4:43 AM GMT  |  Blog: Network technologies and trends   |      ASA, Cisco, Cisco Nexus
TechTarget's weekly roundup (4/1 - 4/8)

Blog   Mobile image via Shutterstock Mobile was a big hit in this week's roundup. Major topics included enterprise mobile applications and Facebook Home's effect on mobile security. 1. Forrester VP says enterprise mobile applications miss the mark - James Denman (SearchSoftwareQuality) During his recent ...

Last updated: Apr 8, 2013   7:57 PM GMT  |  Blog: Enterprise IT Watch Blog
Combating social engineering, BYOD security woes with education

Blog  Think that because your business is not the size of a Target, JPMorgan Chase or Sony means that you're immune from today's breed of cyberthreats? Think again. Just because small and medium-sized businesses (SMBs) don't have the financial resources or the brand reputation many enterprises do doesn't ...

Last updated: Feb 27, 2015   8:28 PM GMT  |  Blog: CIO Symmetry   |      CIO, cybersecurity, Employee training
Web 2.0 Security: XSS, CSRF Attacks

Blog  Cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities have been with us for some time and while many social networks have tightened their defenses against XSS attacks--as have many other conventional websites--there are some social networking worms have used XSS flaws to s...

Last updated: Jan 19, 2010   2:18 AM GMT  |  Blog: Security Corner
How secure is your wireless strategy?

Blog  Hi folks! So in this day and age with all the mobile devices out there, you need a secure wireless strategy. Whether you like it or not your users are going to need wireless access. Some users will be content to use cellular networks, but the majority will prefer to do their data intensive work ove...

Last updated: Nov 30, 2011   11:57 PM GMT  |  Blog: The musings of an IT Consultant
Overheard talking about context-aware network access control

Blog   "There are techniques that can determine the context of access -- the type of device, where it's accessing from, who the user is, [whether it's] legitimate access to this data or application -- and use those techniques to begin to build a policy around what is and what is not appropriate for the...

Last updated: May 16, 2012   5:41 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Beyond price, Huawei makes strategic gains with security effort

Blog  Huawei, which has been gaining influence by leaps and bounds simply because its the network industry price leader, showed real gains in strategic insight in our most recent survey.Huawei is demonstrating that it intends to keep up its build-a-strategy trend by naming a kind of chief se...

Last updated: Aug 1, 2011   2:14 PM GMT  |  Blog: Uncommon Wisdom
Awareness of shared-responsibility model is critical to cloud success

Blog  When companies move to the cloud, it's paramount that they know where theprovider's security role ends and where the customer's begins. The shared-responsibilitymodel is one of the fundamental underpinnings of a successful public cloud deployment. It requires vigilance by the cloud provider and...

Last updated: Mar 20, 2017   2:48 PM GMT  |  Blog: The Troposphere
Hold The Front Page: Common Sense Prevails In IT Security Shock!

Blog  IT, and security especially, is overloaded with slick marketing terms that have little or no substance behind them the classic solution searching for a problem scenario. But just occasionally the complete opposite prevails, as in the most recent test project Ive just completed for Z...

Last updated: Jan 9, 2018   2:17 PM GMT  |  Blog: Networks Generation   |      Uncategorized
Cligs URL shortening flaw highlights social networking ills

Blog  Could flaws in social networks send the Internet spiraling out of control? A flaw discovered in URL shortener Cligs (Cli.gs) last weekend demonstrates the fragility of the social networking ecosystem and how potentially dangerous it could be. Cligs competes against TinyURL and Bit.ly, which domina...

Last updated: Jun 18, 2009   9:48 PM GMT  |  Blog: Security Bytes
The security processes

Blog  I have been reading Bruce Schneier'sSecrets and Lies: Digital Security in a Networked Worldfor some time now. Why it took me so long to finally read it, I don't know - any security geek worth his salt needs the background this book provides. Granted, technology has changed and advanced since thi...

Last updated: Jun 30, 2013   1:49 PM GMT  |  Blog: Security Corner
Security for your tablet!

Blog  Hi folks, just as computer and smartphone security are important, so is tablet security! Any good BYOD strategy should incorporate security in some shape or form. Kaspersky builds an endpoint security product for tablets that helps secure your devices. Kaspersky is one of the few companies that has...

Last updated: May 31, 2012   3:46 AM GMT  |  Blog: The musings of an IT Consultant
Security survey shows personal data may be less safe than two years ago

Blog  Though it's hardly the most objective survey sponsor in the world, security software vendor nCircle Network Security Inc. has published results of a recent survey of 83 IT security professionals showing that nearly two-thirds or 66% said they believe their own personal data is less secure than 24 mo...

Last updated: Feb 27, 2007   3:04 PM GMT  |  Blog: Channel Marker
Secure method to P2V across security zones

Blog  A common VMware Communities question is how to P2V or convert a system from within a demilitarized zone (DMZ) to a virtual machine (VM) running within an ESX host that will be part of the DMZ virtual network. P2V works by imaging the physical host within the DMZ and transferring that image to the a...

Last updated: Nov 17, 2008   4:49 PM GMT  |  Blog: Virtualization Pro
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: