Search Results | Network security
PREV 1...4   5   6   7   8   9   10   11   12   13...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
4 things you might not know about BYOD

Blog  Todays business leaders and employees are driving the business need for BYOD, we know that. As always, network security and preventing security breaches remains a top concern as organizations want to keep their corporate data inside and secure. SearchConsumerization.com in conjunction with ind...

Last updated: Nov 6, 2013   9:03 PM GMT  |  Blog: Intelligence Driven Marketing: The B2B Marketers Blog
Endpoint Security's Shifting Focus

Answer  In the past, endpoint security has focused on protecting endpoint devices, managing this by installing software on these devices. The traditional office, however, is changing, with increasing remote users, telecommuters and road warriors taking these devices on the road, into unknown wireless networ...

Last updated: Jul 28, 2010   2:37 PM GMT   |    Endpoint security, Endpoints, Open IT Forum
Is there a list of trustworthy CA authorities? And does a IDS distro like Security Onion provide enough protection for a local network?

Answer  I'm trying to improve my local network security with my first white boxes pen-test setup and I was wondering if there are any realistic network security setups that can be implemented for a local network without hardware IDS/IPS? As I've observed with pen-testing TLS/CA don't seem so secure, and I'...

Last updated: Oct 8, 2016   7:43 AM GMT   |    Blockchain, IDS/IPS, kali linux
Multiple Counting of CompTIA CEUs OK for Cert Maintenance

Blog   As of January 1, 2011, the CompTIA A+, Network+, and Security+ certifications must be renewedon a three-year cycle. What I didn't know until one of my HP Learning Center students asked me, was that you can count the CEUs ("Continuing Education Units") you must earn to maintain cert currency more...

Last updated: Oct 28, 2011   1:35 PM GMT  |  Blog: IT Career JumpStart
VoIP Security: Don't Be Complacent

Blog  One of the biggest problems with information security is that it is almost always reactive. The entire antivirus industry is built on a model where new threats are unleashed on the unprotected public first, then the antivirus vendors capture a sample and create a defense for the threat to add to the...

Last updated: Oct 19, 2008   1:28 PM GMT  |  Blog: Unified Communications: Click to talk
Advanced public Wi-Fi is key, but security is imperative

Blog  In this guest blog by Cloud4Wi's Jeff Abramowitz, we explore the need to balance public Wi-Fi network installations with advanced security measures to protect users. Connecting to the internet in public spaces is second nature to most of us. Whether its in stores, restaurants, shopping centres,...

Last updated: Nov 11, 2016   2:45 PM GMT  |  Blog: The Full Spectrum   |      Security, Wi-Fi, Wireless
Tech Data Adds Unified Communications and Security to Portfolio

Blog  If you ask me, Tech Data is coming a little late tothe party, but better late than never. Tech data announced that it is adding a unified communications and a network security business unit to its service offerings. The official press release from Tech Data contains this quote: Tech Data is r...

Last updated: Oct 16, 2009   2:35 PM GMT  |  Blog: Unified Communications: Click to talk
Netgear ProSecure UTM9S Merges VDSL and Wi-Fi with Security

Blog  Small businesses don't have full IT departments and network infrastructures like larger companies, but they still have the same needs when it comes to connecting to network resources and making sure data and network assets are protected from threats. Netgear has announced a new appliance-the ProSec...

Last updated: Sep 26, 2011   6:18 PM GMT  |  Blog: The Security Detail
Properly managing IIoT systems to prevent cyberattacks

Blog  According to the McKinsey Global Institute, it will be the industrial internet of things where the impact of IoT will be felt the most. The market for IIoT in factories alone is expected to be worth up to $3.7 trillion per year by 2025. The ultimate aim of IIoT, or smart manufacturing, is to create ...

Last updated: Mar 21, 2017   3:07 PM GMT  |  Blog: IoT Agenda   |      Cyberattacks, IIoT, Industrial IoT
Web 2.0 Security: Corporate Espionage

Blog  Do you block access to social networks from the office? Think this means you're safe? Think again. You're still susceptible to corporate espionage through your employees' social network profiles. The Dark Reading article, "The Seven Deadliest Social Networking Hacks," tells why: To pull off a spea...

Last updated: Jan 23, 2010   4:51 PM GMT  |  Blog: Security Corner
Network and security

Answer  I need a book about network and security... can you recommend a good book where I can read about the network and security ... And much like another book too, which I can use as ITSupport. It may very well be a new book (year) ...

Last updated: Aug 17, 2011   9:23 PM GMT   |    IT Books, Network management, Network security
What to expect from #Interop New York 2014

Blog  Interop is an annual information technology exhibition and trade fair that takes place in five locations around the world, this month's event is in New York. Interop is a show that (unsurprisingly perhaps) promotes the core virtues of interoperability, interchangeability and openness. The confer...

Last updated: Sep 30, 2014   1:03 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Managing IoT resources with access control

Blog  As IoT devices continue to be adopted by organizations in record numbers, two things have become clear. First, far too many of these devices do not include adequate security, meaning they can be easily compromised to serve as slaves in IoT-based botnets, act as a conduit for the spread of malware, o...

Last updated: Jul 27, 2018   4:57 PM GMT  |  Blog: IoT Agenda   |      Access control, cybercriminals, Digital transformation
IoT and security: Using your network to become an IT disruptor

Blog  Despite all of the promises offered by the internet of things, the biggest limitation of this fast-moving space could prove to be security and deep network visibility. To get the most value out of an IoT investment, organizations need to appreciate the capabilities and resources that must be in plac...

Last updated: Nov 19, 2018   8:05 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT monitoring
How do you manage network problem users?

Blog  When I first joined SearchNetworking.com I ran a survey asking you what the No. 1 security threat was in your industry. Your responses impressed me; even to this day I get haunted by the survey results: Across every vertical, a wild majority of networking professionals considered their own users to ...

Last updated: Oct 23, 2009   9:32 PM GMT  |  Blog: The Network Hub
Securing the IoT edge

Blog  The network has undergone a remarkable amount of change over a remarkably short period of time. The clearly defined perimeters of traditional networks have been eroded away by BYOD, mobile computing, migration to the cloud, IoT adoption and the new WAN edge. Of course, this sort of evolution is norm...

Last updated: Apr 15, 2019   4:48 PM GMT  |  Blog: IoT Agenda   |      Authentication, credentials, Edge computing
The challenge of securing building management systems

Blog  Before we dive into it, a building management system (BMS) -- or smart building technology -- is an intelligent microprocessor-based controller network installed to monitor and control a building's technical systems and services, such as air conditioning, heating, video surveillance and elevators. T...

Last updated: Sep 10, 2019   3:16 PM GMT  |  Blog: IoT Agenda   |      BMS, building management system, Internet of Things
Sample I.T. Security Policy - Remote Access Security

Blog   Finally we are almost proceeding towards the completion of the Sample I.T Security policy, we have just two more topics to cover. Coming days I will try to complete that, here we are with Remote Access Security REMOTE ACCESS SECURITY IS CONSIDERED THE FOLLOWING: 1. RAS server provides t...

Last updated: Jul 8, 2008   8:20 AM GMT  |  Blog: Network technologies and trends
Cyber-security policy locks down lobbyist job security

Blog   President Barack Obama promised a bipartisan effort, and in terms of his cyber-security strategy, so far the plan looks remarkably like the 2008 plan recommended by a bipartisan group of computer security experts. The focus is to protect U.S. networks from cyber attack and to increase investment a...

Last updated: Jan 26, 2009   2:15 AM GMT  |  Blog: Telecom Timeout
Common Sense is sometimes all it takes to protect your network from attackers

Blog  In a recent Information Week article, "A Crook Comes Clean", a conviced malicious hacker admitted to helping a crime organization hack into companies networks and steal resources like thousands of minutes of free VoIP usage. One of the most obvious statements he made was this: "it would have been ea...

Last updated: Oct 9, 2007   8:19 PM GMT  |  Blog: David’s Cisco Networking Blog   |      Ethernet
PREV 1...4   5   6   7   8   9   10   11   12   13...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: