Search Results | Network security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Batye's review of "Securing the Borderless Network: Security for the Web 2.0 World"

Blog  Member Batye agreed to review Tom Gillis' book,Securing the Borderless Network: Security for the Web 2.0 World. Interested in free review copies of books? Keep an eye on the forums, or e-mail me at Michael@ITKnowledgeExchange.com and let us know you're interested. We might have something up your a...

Last updated: Jun 28, 2010   8:25 PM GMT  |  Blog: IT Bookworm Blog
Follow Me: Networking Twitter Pros

Blog  We're making some headway in Networking Month with regular updates and ground coverage from Michael Morisy at Interop 2011. But you don't need to travel to Vegas to get the latest in networking news; check out some of these Twitter feeds for regular updates, blog links, and one-to-one interactions w...

Last updated: May 13, 2011   1:16 PM GMT  |  Blog: Enterprise IT Watch Blog
Which certs should I take first?

Answer  Hi everyone, completely new here so.. Here goes my question. I'm currently taking a diploma of Cyber and Digital Security, which covers on networking and ethical hacking (all very lightly). After this Diploma, I'm planning to head more into the network and security side (following the steps of my ...

Last updated: Oct 13, 2008   6:35 PM GMT   |    CCENT, CCNA, Certifications
Virtual network security from the Catbird’s seat

Blog  Sometimes a company is in the right place at the right time. Just as the Gartner Group was issuing a press release in April proclaiming that "organizations that rush to adopt virtualization can weaken security," Catbird was putting the finishing touches on Catbird V-Agent, which was announced today....

Last updated: Jun 25, 2007   12:06 AM GMT  |  Blog: Channel Marker
Is The Perimeter Dead?

Blog  When it comes to network security, the perimeter has traditionally been the primary defense. Organizations have invested a significant amount of time, money and resources into firewalls and other perimeter security technologies aimed at keeping unauthorized network traffic outside and sensitive comp...

Last updated: Sep 18, 2007   1:12 PM GMT  |  Blog: Unified Communications: Click to talk
DH2is New DxOdyssey to Ensure Security for Remote User Access

Blog  DH2is New DxOdyssey, Software-Defined Perimeter (SDP) Software, Promises to Ensure Security for Remote User Access to Cloud Services An Alternative to VPNs, Which Present Management Headaches and Security Vulnerabilities From the IT department to the C-suite, data security has become a key prio...

Last updated: Feb 15, 2019   6:10 PM GMT  |  Blog: Quality Assurance and Project Management   |      Data-security, DH2i
Check Point Integrates FaceTime Web 2.0 Security

Blog  Web 2.0 tools and social networking services offer an increasing challenge for IT and security administrators tasked with balancing the productive flow of communications in real-time with the security risks of leaked and compromised data. Check Point, a leader in network security appliances, has re...

Last updated: Dec 1, 2009   4:45 AM GMT  |  Blog: Unified Communications: Click to talk
Network Security

Blog  SAS70ExPERT@gmail.com. Do SAS70 audits adequately reduce network security risk within your Company? Many SAS70 audits do not. I have found that many audits only review high level security measures. The audits do not perform any penetration testing or do not run any software diagnostics to identify ...

Last updated: Jun 9, 2008   3:59 PM GMT  |  Blog: SAS 70   |      Order Management
Oldie but goodie wireless security resources

Blog  With any responsible wireless network deployment comes security. Securing the access points, securing the computers and securing the communication sessions in between. With enterprise APs, wireless IPSs and related systems well beyond their adolescence, many enterprises have used them to their advan...

Last updated: Aug 25, 2010   6:21 PM GMT  |  Blog: Enterprise IT Watch Blog
The rise of IoT-based Hivenets: How we respond

Blog  In part one of this two-part article, we saw how the new advances of AI and predictive software have created a new paradigm for how computing resources are used via swarm technology. With these advances, however, comes the ability for cybercriminals to apply them to IoT-based botnets that can target...

Last updated: Nov 27, 2017   3:23 PM GMT  |  Blog: IoT Agenda   |      Attack surface, Botnet, Internet of Things
Protecting Windows from the Cloud

Blog  Small and medium businesses (SMB's) have smaller budgets and fewer personnel resources than large enterprises, but they still face the same network security threats and compliance requirements. One option for SMB's is to basically outsource the maintenance of the security infrastructure while retai...

Last updated: Oct 3, 2009   3:16 AM GMT  |  Blog: Tech Strategy Trends
Career

Answer  Hi, I want to take a network security course (CCNA, CCNP security) but present I am certified CCNA (r&s). I am working as a network engineer in a small company. I want to move in security domain. Is it good to know the knowledge about CCNP (r&S). Please give me a suggestion.

Last updated: Mar 29, 2013   8:19 AM GMT   |    CCNA, CCNP, Security careers
Is now the time for NAC?

Blog  Network Access Control is all the rage these days when it comes to network security technologies. "All of the vendors have something they call NAC," says Gartner Inc. vice president and distinguished analyst John Pescatore in a SearchNetworking.com article. Indeed, you and your customers have myriad...

Last updated: Nov 9, 2006   11:34 PM GMT  |  Blog: Channel Marker
How secure is your network? (Part 1)

Blog  After reading this article I began to wonder how secure my home network really is. After giving the article much thought I concluded that my home network is probably not as secure as I would want. Sure it's secure, probably above and beyond most home networks. I use iptables as my firewall. Conn...

Last updated: Feb 11, 2009   6:47 PM GMT  |  Blog: Open Source Software and Linux
How to improve IoT security and resilience with SD-WAN and SDP

Blog  As IoT devices connect to our networks, we need to provide secure, reliable connectivity to the back-end applications that manage and extract information from these devices. But all too often, current security architectures risk exposing those applications to network attacks, such as denial of servi...

Last updated: Apr 30, 2018   4:57 PM GMT  |  Blog: IoT Agenda   |      Availability, Internet of Things, iot
Featured IT Blogger of the Week: Jennifer Jabbusch of Security Uncorked

Blog  This week's featured IT blogger is Jennifer Jabbusch of "Security Uncorked." Jennifer is a network security engineer with over 15 years of experience in the industry. "Security Uncorked," or the "Complete Unofficial Guide to InfoSec," has recently covered topics such as Network Access Control (NAC),...

Last updated: May 21, 2009   7:42 PM GMT  |  Blog: ITKE Community Blog
A Tiny Toolbelt: Lesser-known wireless network security resources

Blog  Managing and securing wireless networks is difficult enough, so why re-create the wheel? Well, you don't have to, at least to an extent. There are several wireless network "standards" you can lean on for ideas, tips, and documentation to help bring things full circle in your wireless environment. He...

Last updated: Sep 2, 2010   6:25 PM GMT  |  Blog: Enterprise IT Watch Blog
deep packet inspection (DPI)

Blog  Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued Quote of the Day "DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and othe...

Last updated: Jul 17, 2019   5:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Mastering IoT compliance in a GDPR world

Blog  Believe it or not, the one-year anniversary of the date the General Data Protection Regulation went into effect is almost upon us. The May 25, 2018 date will live in infamy for many organizations -- particularly those that scrambled to get their people, processes and technologies in order ahead of t...

Last updated: May 17, 2019   3:21 PM GMT  |  Blog: IoT Agenda   |      Compliance, GDPR, Internet of Things
Five Poor Security Practices That Hackers Exploit

Blog  Security audits are vital if you plan to keep your network safe in today's environment. It doesn't have to be complicated. Here are 10 of the most common poor security practices that hackers exploit. Using weak passwords - Don't even get me started on this one! Most of the time it's easy to guess ...

Last updated: Oct 10, 2010   1:54 PM GMT  |  Blog: Security Corner
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: