Email Alerts
-
10 steps to secure instant messaging
If you have or are considering deploying IM system in your corporate communication infrastructure, this tip offers you guidelines for keeping it secure. Tip
-
WEP vulnerabilities -- wired equivalent privacy?
A brief look at some of the security issues related to WEP usage and a link to a more detailed examination of these issues. Tip
-
What constitutes acceptable use?
Be careful with your acceptable use policy; the stricter it is, the harder it is to enforce. Tip
-
Scan for your open ports
Tools for port scanning. Tip
-
Security - Managing the unmanageable
Network column by expert Carrie Higbie on managing security and security policies. Tip
-
IDS and IPS: Information security technology working together
This article explains why organizations need both an IDS and IPS. Tip
-
Securing the IIS metabase
Make sure you secure the metabase in IIS 6.0. Tip
-
Understanding denial-of-service attacks
Mike Paquette of Top Layer Networks explains DoS attacks in this interview. Tip
-
Security policies should work from home too!
Make sure your remote workers follow your security policy. Tip
-
Power to the sniffers
How to power protocol analyzers that don't support PoE. Tip
Network Management Strategies for the CIO