Search Results | Network security
PREV 1...3   4   5   6   7   8   9   10   11   12...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Basic Share Security

Blog  The file server role is one of the simplest roles on the network. Yet sometimes this simple role becomes very complex when we add in security principles. The modern network architect needs to understand how to do it right or get really good at troubleshooting complex security issues. Imagine an...

Last updated: Sep 24, 2011   7:33 PM GMT  |  Blog: Modern Network Architecture
Lookingglass ScoutVision adds visibility in managing partner security risks

Blog  For years, the mantra of the security industry has been to get enterprises to look internally for weaknesses and activity that can raise a red flag to a malware-infected machine or an employee with malicious intentions. But how do you know how secure your partners and clients are? Its not difficu...

Last updated: May 24, 2012   1:24 PM GMT  |  Blog: Security Bytes
Wi-Fi Networks Enter 4th Generation

Blog  New 4th-generation wireless networking equipment is entering the market. We started with consumer-based wireless equipment with virtually no security, then enterprise quality products with improved security were released. The current standard, the 3rd-generation wireless networks, have centralized c...

Last updated: Feb 24, 2008   1:53 PM GMT  |  Blog: Unified Communications: Click to talk
Cisco security strategy: some nuggets from my notebook

Blog  Last week I published a feature that took a long, hard look at Cisco's network security strategy. This story tackled a big subject so naturally I left out a few odds and ends and a little analysis. I thought I'd drop them here for your reading pleasure. Who owns the security strategy at Cisco? Whe...

Last updated: Aug 30, 2010   8:01 PM GMT  |  Blog: The Network Hub
Network security on i5/OS

Blog  Most people know that the System i and i5/OS are known for solid security features, but do you know what those features are? I'm sure plenty of you do, but a new IBM Redbook details i5/OS's native network security features, as well as envisioning some scenarios for network security, password elimin...

Last updated: Dec 12, 2007   10:30 PM GMT  |  Blog: The iSeries Blog
Free IT Book: CompTIA Security+ Video Mentor

Answer  This week's free IT giveaway is the CompTIA Security+ SYO-201 Video Mentor. Answer one of the unanswered questions and leave the link to your answer in the discussion area below. Voice and Data Network Setup WSUS Downstream Server Problem How much of your sensitive information can you trust to o...

Last updated: Dec 27, 2010   4:41 PM GMT   |    CompTIA Security+, Giveaways, Network security
First-generation firewalls do not cut the mustard

Blog  In the wake of the InfoSec information security exhibition in London last month, I think I finally have Part II to my blog written to coincide with the event: Infosec 2011: application (development) appetisers Part I. What I was looking for was some insight into how the mechanics of security techno...

Last updated: May 11, 2011   9:54 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
HIMSS reports spike in health IT security worries

Blog  Until recently cyber-security was one of many issues for health IT executives; now it is top of mind for most. Anecdotally, it is abundantly clear how widespread increased worry about cyber-attacks on healthcare data networks is. Also, a recent SearchHealthIT survey found that security systems are ...

Last updated: Jul 1, 2015   7:02 PM GMT  |  Blog: Health IT Pulse   |      cybersecurity, HIMSS
IoT security and the new branch office

Blog  IoT is now an integral part of every networked environment, from corporate headquarters to the home network. Branch offices and retail locations have been adopting IoT at a breakneck pace, using these devices to provide a wide range of services, while using SaaS cloud servers as their management int...

Last updated: Jun 26, 2019   6:51 PM GMT  |  Blog: IoT Agenda   |      Branch Office, branch security, Internet of Things
Cyber Security Strategy for Enterprises - Key Components

Blog  This is the last post of the series of interaction with Phil Trainor from Ixia. In this post, he will be talking about cyber security strategy. In the previous posts, we have covered Ixia's Solutions, Edge Security, Inline Security, importance of network monitoring, and Network Security Landscape. S...

Last updated: Aug 10, 2017   8:06 AM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security, Ixia
Batye reviews Computer Incident Response and Product Security

Blog  Member Batye agreed to review Computer Incident Response and Product Security. Disclosure: The publisher of the book provided a free copy for this review. This is a good little book as a reference when dealing with the after effects and investigation of a security breach in your company's network. I...

Last updated: Aug 9, 2011   4:42 PM GMT  |  Blog: IT Bookworm Blog
Penetration Testing

Blog  Hi folks! So often there are questions from fellow IT colleagues, what can they use to help them in testing their networks to make sure they are secure? After all, you need to know for sure that everything you've done to secure your network is actually working. How do you verify this? You perform a...

Last updated: Nov 30, 2011   11:57 PM GMT  |  Blog: The musings of an IT Consultant
Squad: Obama, ISP shutdowns and Web security threats

Blog  SearchSecurity.com editors discuss the Obama administration's cybersecurity plans, the FTC shutdown of Triple Fiber Network and what IT security pros can do to address the growing threat posed by the use of social networks and other Web-based services.

Last updated: Jun 13, 2009   2:30 AM GMT  |  Blog: Security Wire Weekly
Defending the internet of things at machine speed

Blog  While the first generation of the internet was primarily focused on connecting people to people via primarily static networks, IoT enables devices to communicate directly with each other across meshed and dynamically expanding networked environments. When combined with increasing levels of device in...

Last updated: May 18, 2018   7:59 PM GMT  |  Blog: IoT Agenda   |      Authentication, Botnet, Fortinet
Can't access System on LAN behind DSL modem

Answer  Two systems running XP Pro SP2. Trying to access PC on LAN behind ActionTEc GT701 DSL Modem over internet. Firewalls disabled, Can see and modify GT701 using remote management, cant map network drive or access system on LAN over internet. All security settings are set for everyones use/modificat...

Last updated: Nov 9, 2006   1:22 PM GMT   |    Networking
Digital surveillance: Keep your eyes peeled

Blog  Digimerge Technologies. JDSU. Lorex Technology. On-Net Surveillance Systems. Videolarm. Do you know any of these companies? If you don't, Tech Data is hoping to change that. The distributor has established a new Physical Security Specialized Business Unit, which will focus on carrying products that...

Last updated: May 15, 2008   9:05 PM GMT  |  Blog: Channel Marker
Wireless Security

Answer  We are running an NT4 network in one building with about 50 users. I have recently installed a LinkSys WAP with a 32-bit WEP encryption key, so when our sales guys come in with their Thinkpads, they don't have to fight for network points. I have programmed the encryption key into their laptops, so ...

Last updated: Sep 10, 2004   9:00 AM GMT   |    Compliance, CRM, Disaster Recovery
Advanced public Wi-Fi is key, but security is imperative

Blog  In this guest blog by Cloud4Wi's Jeff Abramowitz, we explore the need to balance public Wi-Fi network installations with advanced security measures to protect users. Connecting to the internet in public spaces is second nature to most of us. Whether its in stores, restaurants, shopping centres,...

Last updated: Nov 11, 2016   2:45 PM GMT  |  Blog: The Full Spectrum   |      Security, Wi-Fi, Wireless
Multiple Counting of CompTIA CEUs OK for Cert Maintenance

Blog   As of January 1, 2011, the CompTIA A+, Network+, and Security+ certifications must be renewedon a three-year cycle. What I didn't know until one of my HP Learning Center students asked me, was that you can count the CEUs ("Continuing Education Units") you must earn to maintain cert currency more...

Last updated: Oct 28, 2011   1:35 PM GMT  |  Blog: IT Career JumpStart
VoIP Security: Don't Be Complacent

Blog  One of the biggest problems with information security is that it is almost always reactive. The entire antivirus industry is built on a model where new threats are unleashed on the unprotected public first, then the antivirus vendors capture a sample and create a defense for the threat to add to the...

Last updated: Oct 19, 2008   1:28 PM GMT  |  Blog: Unified Communications: Click to talk
PREV 1...3   4   5   6   7   8   9   10   11   12...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: