Search Results | Network security
PREV 1...5   6   7   8   9   10   11   12   13   14...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Combatting the continued expansion of IoT threats

Blog  The expanding threat landscape resulting from the convergence of cyber and physical systems is providing cybercriminals with additional entry points into the corporate network. This is not going unnoticed by cybercriminals. The Fortinet Threat Landscape Report for Q4 of 2018 not only showed that hal...

Last updated: Mar 5, 2019   6:21 PM GMT  |  Blog: IoT Agenda   |      botnets, Internet of Things, iot
Thwart the threat by abiding to network security fundamentals

Blog  Cloud, mobile, and IoT have changed the face of the modern network so its no surprise network security fundamentals have become important for businesses of all sizes. It seems even the largest organizations are just one mistake away from a massive data breach or other system failure, all of w...

Last updated: Apr 28, 2018   3:33 AM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
Debunking the myth that IoT is only a consumer risk

Blog  When people think about the internet of things, they often think about the common "things" they use in their day-to-day lives such as laptops, smartphones and fitness trackers. These things can also include devices that are part of the connected home -- for example, a smart thermostat, baby monitor ...

Last updated: Aug 16, 2017   3:02 PM GMT  |  Blog: IoT Agenda   |      Consumer IoT, Enterprise IoT, Internet of Things
passive reconnaissance

Blog  Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system. Continued Quote of the Day "The more information a security administrator has about a cloud platform, the better the organization can protect and monitor it. ...

Last updated: Oct 23, 2017   4:51 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Hacking
Next-Generation IPS From Cisco

Blog  For organizations that have high-volume networks, such as networks that are used to stream audio or video, or networks that are used to process large quantities of transactions, monitoring can be a problem. The functionality of the network, and the security of the network, are in conflict. From a fu...

Last updated: Dec 5, 2007   2:41 PM GMT  |  Blog: Unified Communications: Click to talk
What to expect at Black Hat 2011

Blog  SearchSecurity.com editors Michael Mimoso and Robert Westervelt preview the upcoming Black Hat security conference. Presentations are slated on network security issues, Google hacking, Windows vulnerabilities and mobile security threats.

Last updated: Jul 27, 2011   5:21 PM GMT  |  Blog: Security Wire Weekly
OSI model (Open Systems Interconnection)

Blog  OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network. Continued Quote of the Day "The Open Systems Interconnection (OSI) model describes how the different software and hardware components involved in a network communication should divide their l...

Last updated: Nov 30, 2018   7:08 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Securing industrial IoT: Spotlight on DMZ and segmentation

Blog  Industrial IoT is ushering the era of IT and OT convergence. However, making traditional OT assets smarter with IT technologies also means a larger cyber threat surface and, hence, more exposure to cyberattacks which are growing smarter as well. Unlike in IT, a breach in OT security means not just ...

Last updated: Sep 29, 2016   4:29 PM GMT  |  Blog: IoT Agenda   |      DMZ, IIoT, Internet of Things
Free online IT education resource

Blog  I recently came across an excellent IT education resource that is free. It is the eTutorials.org website. According to the website it is a source of thousands online tutorials, useful tips, articles, and researched recommendations. Some of the content on eTutorials includes topics like: Adobe: ...

Last updated: Nov 11, 2009   6:31 PM GMT  |  Blog: IT Trenches
Users list top IT security concerns

Blog   These are some of the top IT security concerns as mentioned by users at an informal discussion at the City IT and IT Security Forum aboard the Aurora cruise ship last week: 1) Knowing what information you have to keep, what would cause damage if it leaked, and what can be deleted2) Data loss ...

Last updated: Oct 20, 2008   12:15 AM GMT  |  Blog: Public Sector IT   |      IT and security, privacy
Securing the cloud: Is IDS passe?

Answer  It used to be a good design to not only run applications in different tiers, but also physically separate them on different network switches. Network devices have since improved (security wise) and some folks seem to be alright with virtual switches. And then came the cloud infrastructure where secu...

Last updated: Feb 3, 2010   1:01 PM GMT   |    Cloud Computing, Cloud Security, Knowledge Point Challenge
8 steps for implementing a successful print security plan

Blog  Amidst the proliferation of Internet of Things (IoT) endpoints, the cybersecurity threat landscape has expanded to every mobile, smart and cloud-enabled device on the network. This threatens the resilience of organisations not only from the disruption of business operations, but also the potential r...

Last updated: Jan 27, 2017   8:40 AM GMT  |  Blog: Quocirca Insights
PCI DSS - protecting your credit and debit cards

Blog   The poker game continues. Get set for an all-nighter. David Taylor, Raising the Bet: A National Payment Security Standard Friday's WhatIs.com Word of the Day is Payment Card Industry Data Security Standard, better known as PCI DSS. If you've ever had your debit card replaced without your as...

Last updated: May 13, 2009   5:36 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Overheard - Port Address Translation (PAT)

Blog   As soon as you start using private addresses and PAT in your network, you lose one of the important security features: accountability. If a rogue user of your network is attacking an outside server, it's close to impossible to identify him...Apache, the most popular open-source Web server, doe...

Last updated: Nov 19, 2009   3:46 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Mobile Access: Make it selective and effective

Blog   Security is always a delicate balance: You need to provide efficient access, but only to those that are allowed that access. Because there are a growing number of mobile devices, and more people utilizing them, there is more potential for breach its just a numbers game, really. Your...

Last updated: Mar 14, 2011   5:26 PM GMT  |  Blog: The Business-Technology Weave
Career path in IT

Answer  I am fresh graduate in field of IT majoring in Data Communications. My seriors told me to select a career path in either in Networking ,Database, Systems or Application Programming. I have selected Networking and prepared for CCNA exam. However, lots of books combine between networking and systems e...

Last updated: Jul 7, 2006   3:04 AM GMT   |    Career Development, CCNA, Certifications
Challenges and changes: A look at today's healthcare IoT

Blog  In recent years, the internet of things has drastically improved patient care in the healthcare industry. Whether monitoring temperature, automatically alerting physicians or doing something else entirely, these devices allow doctors and treatment facilities to track real-time data feedback more int...

Last updated: Apr 6, 2018   4:39 PM GMT  |  Blog: IoT Agenda   |      Access management, Connected Health, Data
RSA Conference reflects trends in security landscape

Blog   This year's RSA Conference Europe kicked off yesterday in London. There were the usual keynotes from RSA top management and the usual US style arrangements, including a photo identity check (arguably more of a threat to your personal data than a national security safeguard), a Darth Vader lookalike...

Last updated: Oct 21, 2009   11:22 AM GMT  |  Blog: David Laceys IT Security Blog   |      Security Solutions
How to safely integrate smart homes with larger networks

Blog  As IP-enabled technology for the home continues to increase, networks and security architectures are in dire need of change. Every IoT-enabled smart device inside the home needs to communicate with a server, which is typically located outside the home. The amount of data and frequency of communicati...

Last updated: Dec 15, 2017   4:27 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT hardware
Palo Alto Network Firewall Architecture - Know how

Blog  Palo Alto takes a good approach in designing the architecture for their next generation firewalls. Palo Alto offers processors dedicated to security function that work in parallel. Palo Alto firewall contains separate Control Plane and Data Plane. By separating them Palo Alto is ensuring that each ...

Last updated: Sep 3, 2015   5:43 AM GMT  |  Blog: Network technologies and trends   |      firewall, IPsec, NAT
PREV 1...5   6   7   8   9   10   11   12   13   14...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: