Search Results | Network security
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...   80   90   100...319 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Citrix executive named new Sourcefire chief

Blog  A former sales executive at virtualization vendor Citrix Systems Inc. will take over the helm at Sourcefire Inc. Sourcefire said that John C. Burris will take over the CEO role of the company effective July 14. Burris was head of worldwide sales and services at Citrix. He replaces E. Wayne Jackson,...

Last updated: Jun 16, 2008   8:47 PM GMT  |  Blog: Security Bytes
Web 2.0 Security: Weaponized OpenSocial and Other Social Networking Applications

Blog  If you're on it, you've seen the Facebook messages: "You have a give a heart request;" or, "<name> sent you a hug;" or one of dozens of others. Most of these social networking applications are benign; nevertheless, there's always a risk associated with them. Think about it; you're allowing som...

Last updated: Dec 30, 2009   9:04 PM GMT  |  Blog: Security Corner
Power Users Push UC Envelope

Blog  Companies are typically slow and cautious to adopt new technologies. That is partially a function of due diligence and testing to ensure that any new technology or application will function properly and provide value before committing to adopting it. The larger the enterprise, the slower the process...

Last updated: Apr 11, 2008   3:49 PM GMT  |  Blog: Unified Communications: Click to talk
active defense

Blog  An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult to carry out. Continued Quote of the Day "The concept of active defense is based on increasing the probability of an attacker making a mistake and revealing their presence within the n...

Last updated: May 31, 2018   6:26 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Paranoid about protecting my MAC address--Please read my story

Answer  What is the easiest way to protect your MAC address against spoofing? In 2004 I was the victim of a hacker that somehow spoofed my Cable Modem Mac address and used it to cover his identity while serving copyright material thru the internet. I was unsuspecting until my ISP one day suspended my servi...

Last updated: Jul 24, 2007   2:28 PM GMT   |    Access control, backdoors, Browsers
So many flaws, so little time

Blog  A number of vendors and other entities have addressed significant security flaws in their programs in the last few days. Here's a roundup: -- iDefense Labs has issued an advisory on flaws in RealPlayer, an application for playing various media formats developed by RealNetworks Inc., and HelixPlaye...

Last updated: Jun 27, 2007   12:06 AM GMT  |  Blog: Security Bytes
Securing a server on the domain

Answer  We have a 2003 server in our accouting department. It is currently on a mini network in their office. They want to move the server down to the server room and put it on the domain. How can I secure this server so that the accounting department, domain admin and our backups software only have acce...

Last updated: Oct 9, 2007   0:56 AM GMT   |    Security, Servers
IT Asset Templates

Answer  I am looking for "standardized" templates that would assist large organizations map out current IT infrastructure components. This would help provide a baseline to identify gaps as well as help drive out requirements. Ideally, the template would identify critical IT components and force you to com...

Last updated: Dec 21, 2010   5:41 PM GMT   |    Infrastructure, IT architecture, IT asset management
How can I divide a network in two segments?

Answer  Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide? Regards and tha...

Last updated: Mar 27, 2006   10:51 AM GMT   |    Firewalls, Forensics, Incident response
Is it possible to block souce IP's by their presence in a BotNet?

Answer  A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How woul...

Last updated: Nov 25, 2013   9:38 PM GMT   |    Botnet, DDOS, Firewalls
Can data using a loopback be packet sniffed?

Answer  Does anyone if data that's exchanged on a local machine using a loopback IP be packet sniffed if the PC is connected to a network? I'm trying to figure out the loopback is secure enough for exchanging data. We're using these different platforms: Windows Vista, Windows 7, Mac OS X and Linux...

Last updated: Apr 1, 2014   4:00 PM GMT   |    Loopback, Networking, Packet Sniffing
Network monitoring tools

Answer  I have many monitoring tools for our environment that monitor equipment (snmp), network traffic (netflow, packet analysis), and security (simms), and point products for applications such as exchange. What tools are available to consolidate this information so that it can be displayed and reported to...

Last updated: Jan 22, 2009   4:44 PM GMT   |    Network monitoring
Do mobile networks use encryption on SMS when used for two-factor authentication?

Answer  I understand that a ton of two-factor authentication mechanisms use SMS to deliver single-use passphrase to a user. But I'm looking to find out how secure it truly is. Would it be hard to intercept the SMS message containing the passphrase? Do any mobile networks use some kind of encryption on SMS? ...

Last updated: Dec 31, 2014   5:30 PM GMT   |    Authentication, Mobile
Which course should I do next: MCSE or MCITP?

Answer  I did systems development course which included mobile application development, web development, database and Java (Java2me, EE, SE) and I also did system dupport which included networking, A+, N+ and basic computer security now I'm caught in the mist I don't know which course to do next MCSE or MCI...

Last updated: Feb 3, 2015   12:30 AM GMT   |    IT careers, MCITP, MCSE
New Zealand vendor making next generation IDS a reality

Blog  Until now some experts have signaled the slow demise of intrusion defense systems, but one firm is having success in the government sector with an IDS appliance that can capture 100% of network traffic. In government circles, its the little, but powerful engine that could. New Zealand firm Enda...

Last updated: May 24, 2010   7:28 PM GMT  |  Blog: Security Bytes
Windows Server 2012 in 85% of businesses by 2014

Blog  Are you planning to integrate Windows Server 2012 into your network? With Windows Server 2012 securely off the production line and readily available to the Technology Industry, here at Firebrand Training we surveyed over 1000 technology companies togaugethe mood of the consumer market. We went ...

Last updated: Nov 2, 2012   2:28 PM GMT  |  Blog: The 'How to' Blog
The Cloud: Forecast remains a bit cloudy for security

Blog   Several things are on the rise as concerns the Cloud. Ever more organizations are taking advantage of the Cloud: Its universality; its ready storage potential for shared data (or even static, backed up, data); its grant of access to networks; its dispensation of services, and so on. Rising...

Last updated: May 26, 2011   7:09 PM GMT  |  Blog: The Business-Technology Weave
Cisco Adds Three Specialist Certs to Its Security Lineup

Blog  Last week, I wrote a blog entitled Pondering Certification Building Blocks, wherein I waxed eloquent about certification programs that are wisely and well-built. In particular, I lauded those programs like Microsofts where junior level certs roll up, then add up to more senior level ones,...

Last updated: Feb 3, 2011   3:11 PM GMT  |  Blog: IT Career JumpStart
Payment Card Industry (PCI DSS) Compliance | Requirement 1.1.2

Blog  Payment Card Industry (PCI) Data Security Standards (DSS) compliance for PCI DSS requirement 1.1.2 calls for "Current network diagram with all connections to cardholder data, including any wireless networks" Thus, testing for validating 1.1.2 requires verification "that a current network diagram (fo...

Last updated: Nov 23, 2008   7:24 PM GMT  |  Blog: Regulatory Compliance, Governance and Security
The Seven Deadly Enterprise Security Sins, Part I

Blog   While the security threat landscape has changed drastically over the last decade, in many ways the discussion about security, particularly at the popular level, hasn't kept pace. High-profile breaches, attacks, clever workarounds and individual viruses grab headlines while more sinister, on-going ...

Last updated: Sep 9, 2010   12:54 AM GMT  |  Blog: Enterprise IT Watch Blog
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...   80   90   100...319 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: