Email Alerts
-
Ethical hacking and countermeasures: Network penetration testing intro
Have you ethically hacked your business network? SearchNetworking.com asked this question of our readers and found shocking results: More than half had not conducted a network penetration test -- and the reasons ranged from not knowing enough about n... Interview | 02 Jun 2009
-
Network security threats solved by risk management: John Pironti explains
Network security threats abound, and news of data breaches are constantly made public. Are information security professionals doing something wrong? Where are enterprises most vulnerable? And what can network pros do to keep a company more secure? in... Interview | 19 May 2009
-
Profiling -- and protecting against -- network problem users: The Internet Novice
With this first entry in a new series about network problem users, SearchNetworking.com looks at the Internet Novice. Though well-meaning, Internet novices can pose a significant threat to the corporate network. Education and smart policies can mitig... Article | 12 Mar 2009
-
Physical network security key to fighting low-tech threats
Even if a company buys the latest security products and adheres to data security standards, IT professionals must also consider physical network security to close off avenues of potential data leakage. Think outside the box of the standard network se... Article | 11 Feb 2009
-
New PCI compliance rules ban WEP, tighten wireless LAN security
This year's PCI compliance update puts the focus on pesky WEP access points and tightens some unclear language about wireless LAN. Not paying close attention to the details, however, could land retailers in hot water. Article | 14 Jan 2009
-
Know the risks of running industrial control systems on IP networks
More IT organizations are starting to run industrial Supervisory Control and Data Acquisition (SCADA) systems over the corporate network to save money and to boost bandwidth. However, these industrial control networks are extremely sensitive. Proper ... Article | 07 Jan 2009
-
Vyatta offers more robust open source router and security appliance
Vyatta Inc. debuts its third open source router and security networking appliance in less than nine months, edging further into the enterprise space. Article | 29 Dec 2008
-
Poor data-loss prevention practices almost cost Intel a billion
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data. Article | 13 Nov 2008
-
More than 1 million DNS servers still vulnerable to Kaminsky
More than 1.3 million DNS servers are still exploitable by the Kaminsky vulnerability, according to new research from vendors Infoblox and DNSstuff. Article | 12 Nov 2008
-
Hospital gains network visibility by convincing vendors to collaborate
When Concord Hospital needed to install a network behavioral analysis (NBA) tool into a Nortel network built on multi-link trunking, the hospital's network chief had to convince Nortel to collaborate with his preferred NBA vendor. Article | 30 Oct 2008
Network Management Strategies for the CIO