Search Results | Network security
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   70   80...319 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Moving into the InfoSec role

Answer  I work at a company that currently does not have a position dedicated to information security. I come from a background in networking with a good portion of my focus on firewalls and other security related technologies. I am interested in positioning myself into the role of InfoSec Admin at my comp...

Last updated: Dec 12, 2006   1:36 PM GMT   |    Access control, Application security, backdoors
How soon is PCI scan required on new application?

Answer  Hello, The larger team I work in is about to release a new ecommerce website that allows the secure storage and usage of personal and corporate credit cards. As far as system components go, the payment card info. is stored securely in Oracle and the DB itself is in the private network behind a speci...

Last updated: Mar 30, 2010   11:48 PM GMT   |    PCI compliance
The New Cyber Security Czar

Blog  The US has appointed Rod A. Beckstrom, a technology entrepeneur and author to head up the new National Cyber Security Center. He's an interesting and imaginative choice. Rod has a successful track record as a technology entrepreneur and hes co-authored an interesting book The Starfish and the Spi...

Last updated: Mar 28, 2008   2:16 PM GMT  |  Blog: David Laceys IT Security Blog   |      crisis, Governance, incidents
Security audit of access within Active Directory 2008 network

Answer  We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

Last updated: Feb 3, 2011   8:23 PM GMT   |    Active Directory, Active Directory 2008, Active Directory security
I do not want data in the Security log to be overwritten but i also do not want Window server 2003 to stop serving the network at any time. What settings should i configure on my server?

Answer  I do not want data in the Security log to be overwritten but i also do not want Window server 2003 to stop serving the network at any time. What settings should i configure on my server?

Last updated: Jul 10, 2008   2:31 PM GMT   |    Microsoft Windows Server 2003, Windows Server configuration
Overcome the cybersecurity skills gap to embrace the digital transformation power of IoT

Blog  New technologies are not only being adopted as quickly as they are created, but they are also being woven together in ways that are disrupting even the latest networking strategies. Cloud computing has not only moved computing and applications out of the core network, but with the adoption of things...

Last updated: Feb 25, 2019   6:27 PM GMT  |  Blog: IoT Agenda   |      Automation, Internet of Things, iot
4 things you can do right now to find out if your business is at risk

Blog  A lot of executives and business owners - especially in smaller organizations - haven't a clue about where things stand with information security and compliance. But that doesn't mean they don't have the fiduciary responsibility to do so. Well, here are four things that can be done right now, over t...

Last updated: Sep 14, 2010   11:58 AM GMT  |  Blog: Enterprise IT Watch Blog
Panda Security Publishes Findings from 1st Annual Social Media Risk Index for SMBs

Blog  If you're not familiar with this great company, you need to be. I've written about them here on several occasions. It seems to me that in this highly competitive security industry, these people just seem to want to do it right. They have great products and they're attentive to their clients and pote...

Last updated: Sep 17, 2010   1:24 AM GMT  |  Blog: Security Corner
Borderless Networks: Accelerating the Workplace Transformation (Sponsored)

Blog  This sponsored guest is from Cisco Systems and was written byMark Leary, a Cisco seniorstrategistand Chief Marketing Officer - Network Systems. We work, live, play, and learn in a world that has no boundaries and knows no borders. We expect to connect to anyone, anywhere, using any device, to...

Last updated: Apr 23, 2010   3:29 PM GMT  |  Blog: Enterprise IT Watch Blog
Avoid data gridlock by offloading internet traffic at the digital edge

Blog  As more and more companies become part of the internet of things supply chain, the possibilities for business opportunities grow alongside the digital transformation. But with existing application traffic already straining beleaguered enterprise WANs, how do you avoid the data gridlock that is comin...

Last updated: Sep 14, 2017   3:12 PM GMT  |  Blog: IoT Agenda   |      cloud, Connectivity, Data Management
The internet of things and cybersecurity vulnerabilities

Blog  The internet of things is defined as the interconnectivity or networking of devices, sensors and electronics to communicate through software. With IoT and the typical computing infrastructure that is very familiar, the change in data, access, connectivity and monitoring requires a cybersecurity appr...

Last updated: Jul 28, 2017   5:15 PM GMT  |  Blog: IoT Agenda   |      #eHealth #Healthcare IOT #Wearables #wireless medical devices, Internet of Things, iot
Crucial Considerations when Going Mobile, Pt. IV Security

Blog  Security is of prime concern in the mobile environment. IT security in any realm involves logical security and physical security. Logical security is the integrity of data (content), precision of associated processing, and the delivery of coherent, accurate, content. In other words, data that r...

Last updated: Aug 31, 2012   8:38 PM GMT  |  Blog: The Business-Technology Weave
The network evolution: Virtualization and the cloud force new strategies

Blog  Today's guest post comes from Rivka Little, site editor of and my former colleague from my day's in TechTarget's networking group. I asked her if she'd be willing to write a guest post for this month's look at all things networking, and she agreed, taking on challenging topic of...

Last updated: Apr 9, 2010   12:00 AM GMT  |  Blog: Enterprise IT Watch Blog
CCNA Security version 3.0 is here

Blog  Cisco announces changes in the current CCNA Security exam, withnew announcement Cisco ensured to include many newer technologies, which are widely deployed in today;s Enterprise Networks. The great thing in the CCNA Security version 3 is the addition of Cloud Web Security, Cloud and Virtualization...

Last updated: Sep 25, 2015   7:27 PM GMT  |  Blog: Network technologies and trends   |      CCIE, CCNA, CCNA Security
Top VMware security links

Blog  Keeping track of Security issues associated with virtualization requires a serious investment in time. To aid in that I have put together the top virtualization security links that will continue to grow over time. Top Virtualization Security Links The following links are just a sample of what is a...

Last updated: Dec 10, 2008   3:43 PM GMT  |  Blog: Virtualization Pro
Flexibility, speed needed for corporate data protection

Blog  In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their motivation, hackers often target sensitive company information. Panelists during a session titled "Anti...

Last updated: Nov 30, 2016   5:36 PM GMT  |  Blog: IT Compliance Advisor
Trend Micro launches SaaS security platform

Blog  Another security vendor is getting into the Software-as-a-Service (SaaS) business. Trend Micro has released SecureCloud, a platform that offers messaging gateway security, hosted email security and botnet identification services. And the Cupertino, Calif.-based company is aiming SecureCloud at its ...

Last updated: Jul 31, 2007   2:28 PM GMT  |  Blog: Channel Marker
14 Golden Rules of Computer Security

Blog  In celebration of (almost) being close to releasing my first eBook to the general public, Im releasing the list of the 14 Golden Rules of Computer Security in hopes that any last minute errors will be spotted by my peers here at IT Knowledge Exchange. Heres the list: #1: The best security mea...

Last updated: Aug 31, 2009   2:05 AM GMT  |  Blog: Security Corner
Suggestions needed on continuing my information security career

Answer  Hello, I'm an IT professional with 5 yrs of experience in Software Quality Assurance and Information Security. When I say InfoSec, I mean I have experience getting my organization ISO27001:2005 certified. Mostly my job was concentrated on the Process Compliance part of it and also the entire cycle o...

Last updated: Apr 28, 2008   5:30 AM GMT   |    Certifications, IT careers, Security careers
St. Bernard Software acquires Red Condor

Blog  St. Bernard CEO says acquisition positions vendor for accelerated growth. Web security provider St. Bernard Software said Wednesday that it acquired managed email security supplier Red Condor. San Diego, Calif.-based St. Bernard targets small and midsize businesses with Web security appliances, so...

Last updated: Aug 4, 2010   5:11 PM GMT  |  Blog: Security Bytes
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   70   80...319 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: