Email Alerts
-
Firewall change management and automation can curb human error
Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall configuration. Tip
-
Do Web application firewalls complicate enterprise security strategy?
Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabilities. Tip
-
Application-layer firewalls defend against attacks up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as application-aware attacks. Tip
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the switch alongside NAC's behavior analysis. Tip
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. Tip
-
Preventing hacker attacks with network behavior analysis IPS
Deter enterprise network attacks by learning how network behavior analysis can be used to protect data. Understand the advantages and disadvantages of anomaly-based and signature-based protection and how to use them together to secure your network ag... Tip
-
Using OpenSSH for secure network tunnels on Linux
SSH is secure enough to be used across nonsecure private and public Internets. Learn the basics of SSH execution and how to implement and optimize SSH tunnels with Linux. SSH tunneling features allow remote traffic to be sent through the tunnel, expa... Tip
-
The TPM chip: An unexploited resource for network security
The TPM chip developed by the Trusted Computing Group is installed in most new desktops, laptops and servers. It can be used to strengthen user login authentication, protect against unauthorized software modification, and fully encrypt hard disks and... Tip
-
Shifting defenses and dynamic perimeters challenge network security
Network security faces challenges from de-perimeterization and other IT trends. Fine-grained controls are needed closer to information resources and will increasingly be built into both simple and complex systems. Tip
-
Securing the new network architecture: Security for distributed, dynamic networks
In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, combined with targeted threats against applications and ... Tip
Network Management Strategies for the CIO