Search Results | Network security
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...319 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
How open source is shaping the home network

Blog  Open source already plays a big role in the home network. Most, if not all, home routers and networked devices, including IoT devices, in the home run some form of Linux. Many home routers are based on OpenWRT, an open source operating system based on Linux, but specifically designed for a router. A...

Last updated: Jan 23, 2019   4:55 PM GMT  |  Blog: IoT Agenda   |      connected devices, home router, Internet of Things
HP buys 3Com for 2.7 Billion Dollars

Blog  HP has agreed to its plans to buy router and switching gear maker 3Com for $2.7 billion. This deal will see HP expands its infrastructure portfolio range with 3Coms routers, Switches and Security products as well it will strengthen the HP position in China thanks to 3Coms strong presence in Ch...

Last updated: Nov 14, 2009   11:13 AM GMT  |  Blog: Network technologies and trends
Blasts From The Past

Blog   Been doing a few catch-ups with old vendor friends recently; one was Brocade - and more of this next month - which has a REAL SDN/NFV story - and another was NetScout; networking monitoring!!!! Except that network monitoring now goes way beyond SNMP probes and Sniffers.Speaking with NetScout's Phil...

Last updated: Mar 23, 2015   4:24 PM GMT  |  Blog: Networks Generation   |      Internet protocol, NetScout, Network analysis
Kill Your WEP Now

Blog  The announcement on Tuesday that indicted 11 people for "the largest data breach in history" was an interesting read: The indictment returned Tuesday by a federal grand jury in Boston alleges that the suspects hacked into the wireless computer networks of retailers including TJX Cos., BJ's Wholesa...

Last updated: Aug 7, 2008   4:39 PM GMT  |  Blog: Sister CISA CISSP
Cisco Security Manager 4.0 eases Network Administrators tasks

Blog   Cisco Systems introduced its 4.0 version of Cisco Security Manager (CSM). Cisco Security Manager (CSM) is an enterprise-class security management application which provides insight into and control of Cisco security and network devices including Cisco ASA 5500 Series Adaptive Security Appliances...

Last updated: Aug 31, 2010   10:40 AM GMT  |  Blog: Network technologies and trends
Update on physical security failure

Blog  Hollering on the right channels seems to have gotten results. Here's the update on the physical security problem I mentioned in my last post. These are excerpts from emails. Us: We are experiencing another issue with our network cable in the Phone/Data Closet. Our server was down again this morni...

Last updated: Oct 30, 2012   4:31 PM GMT  |  Blog: Security Corner
Responding to the postal strikes

Blog   Just talk to any business owner, whether small, medium or large, and you'll quickly spot a golden opportunity for the security industry. This season's postal strike will generate a tipping point for many companies to finally ditch paper and move to the Internet. In practice, however, it's far from ...

Last updated: Oct 16, 2009   6:24 PM GMT  |  Blog: David Laceys IT Security Blog   |      Security Solutions
Four stages of securing the super-connected world

Blog  October is National Cybersecurity Awareness Month. The initiative by the Department of Homeland Security and the National Cyber Security Alliance is a huge collaborative effort spanning both public and private sectors, and a good demonstration of how the industry is coming together to safeguard the ...

Last updated: Oct 31, 2017   4:34 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Data-security, DDOS
Book Review: CISSP All-In-One Exam Guide (Sixth Edition)

Blog  Sixth edition. That alone should tell you a lot about this book. There are tons of CISSP exam prep resources out there, and a virtually endless supply of information security books--but very few can claim to be in their sixth edition. The fact that Shon Harris' CISSP All-In-One Exam Guide is still t...

Last updated: Feb 7, 2013   7:10 PM GMT  |  Blog: The Security Detail
SANS Mentoring

Blog  This is exciting, I will be leading a SANS mentor session in Winnipeg. The sessions will run from January 26th, 2012 until March 29th, 2012. This is Security 504, Hacker Techniques and Incident Handling. This material is excellent and is somethin...

Last updated: Aug 24, 2011   2:41 AM GMT  |  Blog: Irregular Expressions
Is there an orange ball in information security?

Blog  In Japan many retailers have what look like orange balls or waterballoons near checkouts. Bruce Schneier, a leading information security expert, recently blogged about these orange balls as anti-robbery devices. Could we find any type of orange ball to use for information security, to "mark" packets...

Last updated: Sep 10, 2010   5:05 PM GMT  |  Blog: IT Trenches
Local Security for Vista Home Premium - Network Access

Answer  Hi there Vista Home Premium - I've been trying to configure the local security option for Network Access - sharing and security model for local accounts, to 'Classic - local users authenticate as themselves'. This PC communicates with another where an account has been created ( user and password (wi...

Last updated: Apr 20, 2009   4:51 AM GMT   |    Authentication, C#, Classic - Local users authenticate as themselves
What security challenges do you contend with and what do you think can be done about them?

Answer  What do you see as the biggest impediment to good security across your network? Furthermore, what do you think can be done to get past where you're currently at? More technology? Fewer users? More regulations? Better management buy-in? I'm putting this out there as a discussion piece for perspective...

Last updated: Nov 9, 2018   12:42 AM GMT   |    Information security, IT security, Network security
Checking networks for flaws and defects

Answer  Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

Last updated: Aug 24, 2010   2:36 PM GMT   |    Network management, Network security, Network Security Management
The singularity in the room: The black holes of the IoT/OT world

Blog  Edgard Capdevielle, CEO of Nozomi Networks, agreed to have dinner with me in NYC after a long day of meetings and lectures to our partners and customers. When I walked up to the restaurant, Edgard was outside with his phone glued to his ear, and I couldn't help but overhear his half of the conversat...

Last updated: Dec 12, 2017   5:29 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, iot security
Googles security acquisition of Postini, whats next?

Blog  Googles acquisition of email and messaging security vendor Postini is being seen as a sign that the search engine giant sees growth potential among enterprise customers, particularly in on-demand software. Its the second security acquisition it made in recent months and it could result in cont...

Last updated: Jul 9, 2007   7:11 PM GMT  |  Blog: Security Bytes
The cost of confused and conflicting guidance on Cybersecurity

Blog   The launch of the Information Society Alliance (EURIM) report on Security by Design went very well and rather than blog on the event myself I will cross refer to Leonard Anderson's blog. he clearly enjoyed it. His concern over the need to also promote the messages to local government, including&nbs...

Last updated: Oct 28, 2010   2:45 PM GMT  |  Blog: When IT Meets Politics   |      CLAS, CoCo, Eurim
Charting the vendor landscape for web and email security

Blog  Today's threat landscape is complex. Hackers no longer lust for fame, rather looking for ways to make their fortune. Simple exploits, such as a malicious email sent en masse, are no longer effective. This means that they have turned their hands to more sophisticated attacks, often highly targeted at...

Last updated: Feb 1, 2011   10:37 AM GMT  |  Blog: Bloor Security   |      Uncategorized
Can Germany really ban hacking tools?

Blog  This week's Security Blog Log roundup starts with Germany's stunning move to ban hacking tools. I use the word stunning because I don't see how any government could possibly enforce such a thing. According to The Register, Germany is updating its criminal code to define denial-of-service attacks an...

Last updated: Jun 1, 2007   8:56 AM GMT  |  Blog: Security Bytes
Juniper Networks introduces flexible education program for their partners

Blog   With addition of new partner program by Juniper Networks helps their partners to build expertise in core areas include security, switching, routing, mobility and cloud networking. The Continuing Education Program from Juniper Networks has been designed to empower systems and sales engineers by ...

Last updated: Jan 30, 2011   10:21 AM GMT  |  Blog: Network technologies and trends
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...319 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: