Search Results | Network security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...319 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
New CCNA Certifications-- CCNA Voice, CCNA Security & CCNA Wireless

Blog  As the network trends are changing so does Cisco, they came up with three new certifications. The hot new areas for CCNA Certifications are Voice, Security and Wireless. Intorduction of these three certifications can assure and help you to verify the specialized skills that are great demand among em...

Last updated: Jul 1, 2008   7:25 AM GMT  |  Blog: Network technologies and trends
Would like to hear from you

Blog  As Sean mentioned in his introductory post, the editors behind Channel Marker are preparing to launch a set of Web sites to meet the information needs of the technical folks who implement and support technical solutions as a service. Im spearheading our efforts in the networking and security spac...

Last updated: Aug 31, 2006   8:53 PM GMT  |  Blog: Channel Marker
Taking back network control in the IoT era

Blog  One of the biggest mistakes organizations make when it comes to security is falsely believing that the internet of things is the future, rather than understanding that it is, in fact, the present. We already have numerous IoT devices on our corporate networks -- they've just been flying under the ra...

Last updated: Jan 17, 2019   6:51 PM GMT  |  Blog: IoT Agenda   |      device discovery, Internet of Things, iot
Cisco to acquire Lancope to enhance their Cyber Security Threat Defence Capabilities

Blog  This week Cisco announced their intention to acquire Alpharetta, GA based network security company called Lancope, Inc for$452.5 million in cash. Lancope provides network behaviour analytics, threat visibility and security intelligence to help protect companies against top cyber security threa...

Last updated: Oct 29, 2015   3:56 PM GMT  |  Blog: Network technologies and trends   |      Cisco, Cisco security, Network security
Security Knowledge in Practice implementation

Answer  Hello, I am currently a student at the University of Advancing Technology and I am learning about security implementation frameworks this week. I was looking into a framework named Security Knowledge in Practice (SKiP) and I noticed some things about the framework and I wonder if anyone who has imp...

Last updated: Apr 17, 2013   5:27 AM GMT   |    Network security, Security, SKiP
Would you like some snake oil with that network assessment?

Blog  There are many IT services firms - including some run by friends and colleagues of mine - that perform something called "network assessments." The purpose of these assessments, which are usually aimed at SMBs, is to determine the overall health of your network and computing environment, supposedly i...

Last updated: Sep 28, 2010   11:00 AM GMT  |  Blog: Enterprise IT Watch Blog
Civil serf: UK government to call time on employee blogs and social networking?

Blog  Has government decided to get tough on bloggers in its midst? The disappearance of Civil Serf, a blog apparently written by a civil servant and claiming to expose the inner workings of a government department, has prompted speculation that the blog's revelations may have triggered the creation of a ...

Last updated: Mar 10, 2008   5:02 PM GMT  |  Blog: Computer Weekly Editor's Blog   |      bloggers, Blogging, Blogs
Word of the Day: Wireshark

Blog   "Proactive network analysis can decrease your stress levels in the long run, enabling you to live longer and enjoy your retirement on that small secluded cove by your new beach house." -- Laura Chappell Word of the Day Today's Word of the Day is Wireshark, an open source network for...

Last updated: Oct 9, 2013   2:24 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Rogue Wireless Devices Create Security Risk

Blog  Wireless networks can be cost effective and help employees to be more productive, freeing them to move about while still maintaining access to necessary data and network resources. Since the inception of wireless networking though, corporations have struggled with the security implications. With com...

Last updated: Mar 1, 2008   4:48 AM GMT  |  Blog: Unified Communications: Click to talk
4 tips to safely onboard IoT devices onto your Wi-Fi network

Blog  In the last three yearsapproximately one in five organizations has been subject to an IoT-based cyber-attack, according to Gartner Research. The IoT attack surface continues to grow quickly as more IoT endpoints are connected online. Perhaps IoT adoption has not affected your organization's securi...

Last updated: Sep 10, 2019   2:26 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT cybersecurity
Free IT Book: Network Security Technologies and Solutions

Answer  From the back of the book: "A comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. Understand and implement current, state-of-the-art network security technologies to ensure secure communications through the network infrast...

Last updated: Dec 13, 2010   6:35 PM GMT   |    Cisco, Disaster Recovery, Giveaways
Access Denied: 7 Steps to Crafting NAC Policy

Blog  There are many phases to creating a wireless network, from planning to deploying. But concerns for your network don't end there; beyond initial set up and deployment is management and security. One of the big monsters in network security is the end user, so security and network management begin with...

Last updated: Aug 24, 2010   11:09 AM GMT  |  Blog: Enterprise IT Watch Blog
Microsoft Conficker dangers ahead

Blog  Thomas Cross, X-Force security researcher for IBM ISS, discusses the possible dangers posed by the Conficker/Downadup worm. Researchers are waiting for the payload. Program links: Microsoft Conficker worm hits peak, but payload awaits: Security researchers are fascinated by the spreading...

Last updated: Jan 28, 2009   7:17 PM GMT  |  Blog: Security Wire Weekly
Who Needs Network Security?

Blog  De-perimeterisation is a reality. "You've already been de-perimeterised" as we say in the Jericho Forum. But reports of the death of Network Security have been exaggerated. Network World have just published a piece by me on The Future of Network Security. It's a regular Jericho Forum column, so wor...

Last updated: Feb 2, 2008   12:21 AM GMT  |  Blog: David Laceys IT Security Blog   |      architecture, Security Solutions
How can Ciscos Network Security and Deployment Methodologies help you?

Blog  In this article, author David Davis explains how Ciscos Network Security and Deployment Methodologies can help you and any enterprise customer. This knowledge is useful whether you are implementing security on your network, doing a major router upgrade or even working on a personal project at hom...

Last updated: Jun 23, 2008   4:29 PM GMT  |  Blog: David’s Cisco Networking Blog
Another Cisco Acquisition or Two

Blog  There was a time that it seemed like you couldnt go a day without hearing about a company that Cisco acquired. While those days seem to be behind us, there seems to have been a recent uptick in this area. Last week Cisco purchased an Israeli mobile upstart called, "Intucell" for a cool $475 mill...

Last updated: Jan 31, 2013   0:27 AM GMT  |  Blog: Can you hear me now? Tales from a Cisco voice instructor
What's the one network security tool that you can't live without?

Answer  With security breaches becoming more frequent, expert Michael Gregg looks at network security tools that no tester should be without. We would like to know....what's the one network security tool that you can't live without?

Last updated: Apr 15, 2013   2:40 PM GMT   |    Network security, Security
Security bloggers, podcasters get day in sun

Blog  These days, you can't log onto Twitter or do a Google search without crashing headfirst into something information security related. Security pros have embraced social networking in a big way, and they're contributing a lot more to the blogosphere and Twitter arena than updates on where they're havi...

Last updated: Apr 23, 2009   4:19 PM GMT  |  Blog: Security Bytes
Cisco - the Security Company of the year?

Blog  I know, I know, could it be true? Could Cisco be chosen as the computer security company of the year? Or has the ISSA just been watching too many Cisco commercials? Well, it is hard to say. Don't get me wrong, I love Cisco hardware. It is rock solid. However, there are a lot of security companies o...

Last updated: May 28, 2008   8:39 PM GMT  |  Blog: David’s Cisco Networking Blog
how can i learn to be a network admin/engineer?

Answer  i am getting a degree in network security/telecommunications currently. is school going to teach me everything i know to do a job or it's just going to give the skills to get it done but how do actually get experience in doing it which is what an employer wants. internships are hard to get as they r...

Last updated: Mar 24, 2009   8:57 PM GMT   |    Information security, IT careers, Network administration
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...319 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: