Search Results | Network security
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Stolen PlayStation Network data includes CVV numbers; lawsuits filed

Blog  Hackers posting on underground forums claim the data stolen from the PlayStation Network includes user names, addresses, dates of birth, credit card numbers, expiration dates and card verification value numbers (CVV). Brian Krebs of Krebs on Security linked to a host of screenshots from hacker forum...

Last updated: Apr 29, 2011   1:04 PM GMT  |  Blog: Security Bytes
Redux: Security Baseline for Small Businesses

Blog  This story bears repeating. The more things change, the more they stay the same. Many small business owners treat their business computers like their home computers; they run minimal security and engage in unsafe computing practices. This isn't my opinion, mind you, it is based on my years of field ...

Last updated: Jul 31, 2012   10:00 PM GMT  |  Blog: Security Corner
A Tale of Two Cyber Attacks

Blog  Lockheed-Martin was the target of a 'significant and tenacious' cyber attack, and Sony has been plagued by attacks for a month now. However, the results of the two network attacks are completely different. The attack on Lockheed-Martin has been linked to the attack earlier this year on RSA Security...

Last updated: May 30, 2011   4:36 AM GMT  |  Blog: The Security Detail
Read This: Networking Blogs

Blog  As networking month continues, we continue to bring you guides on the best places to get information and insight from networking professionals. Thank you to everyone who recommended a blog to us (in the forums and on Twitter), and especially thank you to those who write these great blogs! Check them...

Last updated: May 18, 2011   6:59 PM GMT  |  Blog: Enterprise IT Watch Blog
Think Tank on Social Networking

Blog  I had a little chuckle to myself when I read the quote from the BCS in the Computer Weekly Security Think Tank on Social Networking. As a result of the strong human desire to connect, social networking websites have encouraged online behaviour where security and privacy are not always the first prio...

Last updated: Feb 6, 2008   6:04 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Social networking
As Sony discovers, security breaches are no game

Blog  It's all fun and games until someone gets hacked. Literally. As Dr. Paul Judge, chief research officer and VP of Barracuda Networks, told USA Today, the hack of Sony's PlayStation Network is "arguably the second largest data breach ever" after the Heartland Payment data breach. Judge cites the brea...

Last updated: Apr 27, 2011   7:58 PM GMT  |  Blog: Enterprise IT Watch Blog
U.S. House introduces act to reduce P2P file-sharing security risks

Blog  U.S. Rep. Edolphus Towns (D-N.Y.) this week introduced H.R. 4098, The Secure Federal File Sharing Act, which would require the Office of Management and Budget to issue guidance to prohibit the personal use of peer-to-peer file-sharing software by government employees. Towns, who sits on the H...

Last updated: Nov 19, 2009   6:24 PM GMT  |  Blog: IT Compliance Advisor
Palo Alto Networks releases PAN-OS 8.1 and new hardware firewalls

Blog  The recent press release from Palo Alto networks comes with a great surprise as they released PAN-OS 8.1 which comes with some great new features and enhancements, also the new hardware they introduced have plenty to offer. With growing threats targeted in form, SSL is always challenging to interce...

Last updated: Feb 21, 2018   5:42 AM GMT  |  Blog: Network technologies and trends   |      Data centers, Decryption, Networks
A review for "Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP"

Blog  The newly released Cisco Press title Cisco Next-Generation Security Solutions seems to be a great resource which deals with Cisco ASA FirePOWER Services, NGIPS and AMP. Thanks to Cisco Press for sharing the eBook with me. I have been eagerly waiting for this title as I was keen to know how Cis...

Last updated: Aug 2, 2016   5:35 AM GMT  |  Blog: Network technologies and trends   |      CCIE, Cisco, Cisco ASA
Face-off video: Thompson and Shostack on social networking, data privacy

Blog  In case you missed it on the SearchSecurity.com home page this week, please check out the first in our latest series of face-off videos, featuring security industry luminaries Hugh Thompson, founder of People Security, and Adam Shostack, author of The New School of Information Security. In this ins...

Last updated: Apr 2, 2010   10:00 AM GMT  |  Blog: Security Bytes
Disconnect an unauthorized wireless device

Answer  When using the Netgear router setup facility, under "wireless devices" I noticed a connected device labelled "Android" and I think someone has gotten past the security and is connected to the router and network. The guest network is not enabled. The network password is fairly strong and would not ...

Last updated: Jun 3, 2013   2:01 AM GMT   |    Netgear router, Security
SDN NBI security issues

Answer  What are the open security issues or weaknesses in northbound interface of Software defined networks?

Last updated: Jul 21, 2016   1:51 PM GMT   |    SDN, Security
What are the benefits of CompTIA A+ and CCNA certifications?

Answer  What's my job prospect with CompTIA A+, Network +, CCNA, CCNA Security and CCNA voice?

Last updated: Aug 11, 2014   7:58 PM GMT   |    CCNA Certification
Cisco announces Smart Grid Solutions

Blog   Last week Cisco Systems announced the first offering in its Connected Grid portfolio, a transformational Router and Switch that will help utilities more reliably and efficiently deliver electric power from generation facilities to businesses and homes, resulting in better energy management,...

Last updated: May 31, 2010   5:19 AM GMT  |  Blog: Network technologies and trends
Sample IT Security Policy - User Security

Blog  As promised I am trying to cover the topics I posted in my first post, now we are proceeding towards the User Security. We should consider the following while drafting the User Security policy. 3USER POLICY IS CONSIDERED THE FOLLOWING: 1. Networked systems shall update regularly with the ...

Last updated: Jun 24, 2008   5:19 AM GMT  |  Blog: Network technologies and trends
Members Decide: The best of network security

Blog  Network security is one of those topics where everyone has an opinion, but there's no way to know what's right until you try it. We've tried to alleviate the need to frantically practice trial-and-error on every last network security product for the enterprise by polling IT Knowledge Exchange member...

Last updated: Dec 9, 2010   2:03 PM GMT  |  Blog: Enterprise IT Watch Blog
MoD admits 16 security breaches were via social media sites

Blog   Under the Freedom of Information Act, Lewis PR asked the Ministry of Defence how many incidents there have been of confidential information or records being leaked via social media sites and the internet in the last 18 months.The MoD said 16. It was more slippery when Lewis PR asked what disciplina...

Last updated: Jan 25, 2010   11:40 AM GMT  |  Blog: Public Sector IT   |      freedom of information, IT and security, Project management
What the rise of industrial IoT means for cybersecurity

Blog  It is difficult to find an industrial or operational technology firm today not focused on -- or at least exploring how to -- incorporate IoT. According to some estimates, the industrial IoT industry will have more than 46 billion active industrial connections by 2023. The market is demanding smart f...

Last updated: Jul 1, 2019   6:46 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, IIoT, IIoT security
Today is the 10th Annual Sysadmin Day

Blog  I just heard that today is the 10th Annual Sysadmin Day. From the website: A sysadmin unpacked the server for this website from its box, installed an operating system, patched it for security, made sure the power and air conditioning was working in the server room, monitored it for stability, set up...

Last updated: Jul 30, 2009   5:03 PM GMT  |  Blog: Server Farming
Cisco Confirms VoIP Security Hole

Blog  VoIP is the new wireless (unfortunately, wireless is still the new wireless as well). By that, I mean it is the hot new technology that everyone is implementing even though they don't really know how to properly deploy it and they have even less knowledge of how to secure it. Vendors are guilty too....

Last updated: Dec 11, 2007   2:21 PM GMT  |  Blog: Unified Communications: Click to talk
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: