Search Results | Network security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Ixia - Key Highlights of Ixia's Solutions To Support Network and Security

Blog  What are the key highlights of Ixia's solutions? Ixia delivers a powerful combination of innovative solutions and trusted insight to support network and security products, from concept to operation. Whether preparing for the product launch, deploying an application, or managing a product in operatio...

Last updated: Aug 10, 2017   7:49 AM GMT  |  Blog: Quality Assurance and Project Management   |      Ixia, Network security
Free VoIP Security Tools from SecureLogix

Blog  SecureLogix has released a suite of VoIP security assessmenttools that are available as a free download from their web site (SecureLogix.com). The tools can help analyze the security of your VoIP network and determine whether it is susceptible to attacks such as Denial-of-Service (DoS), Man-in-t...

Last updated: Sep 29, 2008   3:41 AM GMT  |  Blog: Unified Communications: Click to talk
Your guide to the networking blogosphere

Blog   If the Internet really is a series of tubes, it's network engineers who keep those tubes running. But how, exactly, do you keep it running today while keeping an eye on what you'll need tomorrow? Get the experts' opinions from our picks of the top networking blogs. Know of a great networking blog ...

Last updated: Apr 1, 2010   12:00 AM GMT  |  Blog: Enterprise IT Watch Blog
Unified Threat Management

Blog  It seems that the world of information technology and information security is pursuing a path to harmony and cooperation. The current buzz word is "unity". We have unified communications- converging IP networking, email, voicemail, voice communications, and instant messaging to provide an integrated...

Last updated: Oct 11, 2007   4:55 PM GMT  |  Blog: Unified Communications: Click to talk
LAN Security: What Hackers Don't Want You To Know

Blog  This blog is titled "Connectivity" because it deals with all aspects and issues of network connectivity. That includes how to ensure your network connectivity is secure and available, and how to make sure that malicious attackers can not intercept or disrupt your network connectivity. Do you know wh...

Last updated: Nov 29, 2007   2:17 PM GMT  |  Blog: Unified Communications: Click to talk
Batye's Review of "Stealing the Network"

Blog  Member Batye agreed to review Stealing the Network: The Complete Series Collector's Edition. If youd like to review a book for the Bookworm Blog, send me an e-mail at Melanie at ITKnowledgeExchange.com to express your interest. Disclosure: The publisher of the book provided a free copy for this r...

Last updated: Feb 3, 2011   3:30 PM GMT  |  Blog: IT Bookworm Blog
Juniper introduces JUNOS PULSE

Blog  With the introduction of JUNOS PULSE Juniper Networks is providing wide-range of security solutions for mobile devices, yes the JUNOS PULSE suite is the only integrated solution currently providing security and secure connectivity for most of the mobile devise starting from an iPhone, Blackberry t...

Last updated: Oct 31, 2010   7:25 PM GMT  |  Blog: Network technologies and trends
Is that network insecure or unsecure?

Blog  Which is correct? The bottom line seems to be that you can't browse securely on an ________ network. a. insecure b. unsecure Answer: a. Explanation: According to most sources, unsecure is not a word. Describing a network as insecure makes it sound like it needs assertiveness training but that's ...

Last updated: Dec 18, 2009   2:00 PM GMT  |  Blog: Writing for Business
Network security concerns: Mo' remote workers mo' problems

Blog  When the network was built like a castle, located in one static location, it was easier to have perimeter defense--the castle walls, the moat and hill (i.e., the firewalls)--protecting the royalty... I mean, data. Nowadays, there's more royalty (information) to keep track of and they don't stay put ...

Last updated: Feb 14, 2008   8:01 PM GMT  |  Blog: The Network Hub
Reflex Security releases Virtualization Management Center for VM management

Blog  This post was written by SearchEnterpriseLinux.com assistant editor Caroline Hunter At VMworld 2008, virtualization security leader Reflex Security Inc. will release Virtualization Management Center (VMC), a product that makes virtual machine (VM) activity visible to security administrators. By pro...

Last updated: Sep 16, 2008   2:34 PM GMT  |  Blog: The Virtualization Room
EMC, Cisco and Microsoft form security alliance

Blog  One of the more interesting press releases to catch my attention this morning is from Cisco, EMC and Microsoft. The IT giants have formed an alliance promising "the most comprehensive, security-enhanced, commercial, multi-vendor, end-to-end information-sharing technology architectures for helping pr...

Last updated: Jul 11, 2007   10:36 AM GMT  |  Blog: Security Bytes
Cellular technology can improve IoT security

Blog  The recent hijacking of thousands of printers to print out propaganda for the popular YouTuber, PewDiePie, gave us insight into the direction of the IoT ecosystem and what security breaches mean in an increasingly connected world. The attack, while generally harmless, underscores the need for cybers...

Last updated: Jan 21, 2019   6:47 PM GMT  |  Blog: IoT Agenda   |      Authentication, cellular IoT, cellular network
IoT is everywhere -- your security should be too

Blog  Over a million new IoT devices are being connected to the internet daily. Experts predict that as many as 25 to 50 billon IoT devices and sensors will be deployed by 2020, for an average of 4.3 internet-connected devices for every man, woman and child on the planet. Consumer IoT devices such as sma...

Last updated: Mar 8, 2017   8:55 PM GMT  |  Blog: IoT Agenda   |      Consumer IoT, Enterprise IoT, Internet of Things
Endpoint security: As easy as flipping a switch?

Blog   Most efforts to improve endpoint security focus on corporate policy enforcement, intrusion prevention systems and network access control software. But now one vendor is taking a different approach. ConSentry Networks of Milpitas, Calif. wants to address the problem through network switching. The co...

Last updated: Jun 1, 2007   5:20 PM GMT  |  Blog: Channel Marker
Sony's Troubles

Blog  Hi folks! So as you probably know by now, Sony had a huge breach of consumer data that ended up in them having to shut down the PlayStation network. This is a classic example of how nobody is immune to these kinds of attacks. I think often people get a false sense of security with their personal da...

Last updated: May 30, 2011   3:22 AM GMT  |  Blog: The musings of an IT Consultant
Massive IoT: Security is vital

Blog  While it is early days for 5G, one thing is clear: security and privacy will remain fundamental requirements, with the changes foreseen for 5G likely to broaden the range of attractive attack targets. We believe that massive IoT, one of the main application segments for 5G identified by standardizat...

Last updated: Sep 28, 2016   4:30 PM GMT  |  Blog: IoT Agenda   |      5G, 5G technology, Authentication
Cisco announces Cybersecurity Specialist certification

Blog  Its a known fact that there is a huge demand for cybersecurity experts, in fact its been estimated that the demand for cybersecurity experts growing at 12 times the overall job market. Cisco always wants to stay ahead in race so they came out with a new Cisco Cybersecurity Specialist certifica...

Last updated: Jan 22, 2014   12:18 AM GMT  |  Blog: Network technologies and trends
Cisco 2010 Midyear Security Report released

Blog  Cisco Systems released the Cisco 2010 Midyear Security report, according to the report, the increasing use of Social networking sites, the proliferation of network enabled mobile devices, smart phones and virtualization continue to alter the security landscape. Which may enforce the Security Pro...

Last updated: Jul 29, 2010   6:18 AM GMT  |  Blog: Network technologies and trends
Chris Wolf: VMsafe is cool because …

Blog  VMsafe, the new security technology created by VMware Inc., gives virtualization users the ability to monitor and secure virtual machine resources in ways never before possible. After I wrote a short article on VMsafe last week, I received feedback from Burton Group analyst Chris Wolf, who was at t...

Last updated: Mar 3, 2008   6:22 PM GMT  |  Blog: The Virtualization Room
Batye's review of "Securing the Borderless Network: Security for the Web 2.0 World"

Blog  Member Batye agreed to review Tom Gillis' book,Securing the Borderless Network: Security for the Web 2.0 World. Interested in free review copies of books? Keep an eye on the forums, or e-mail me at Michael@ITKnowledgeExchange.com and let us know you're interested. We might have something up your a...

Last updated: Jun 28, 2010   8:25 PM GMT  |  Blog: IT Bookworm Blog
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: