Email Alerts
-
Using OpenSSH for secure network tunnels on Linux
SSH is secure enough to be used across nonsecure private and public Internets. Learn the basics of SSH execution and how to implement and optimize SSH tunnels with Linux. SSH tunneling features allow remote traffic to be sent through the tunnel, expa... Tip
-
The TPM chip: An unexploited resource for network security
The TPM chip developed by the Trusted Computing Group is installed in most new desktops, laptops and servers. It can be used to strengthen user login authentication, protect against unauthorized software modification, and fully encrypt hard disks and... Tip
-
Shifting defenses and dynamic perimeters challenge network security
Network security faces challenges from de-perimeterization and other IT trends. Fine-grained controls are needed closer to information resources and will increasingly be built into both simple and complex systems. Tip
-
Securing the new network architecture: Security for distributed, dynamic networks
In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, combined with targeted threats against applications and ... Tip
-
How to configure Windows Server 2008 advanced firewall MMC snap-in
Find out new features of the Windows Server 2008 Advanced Firewall -- and how to configure this powerful host-based firewall using the new MMC snap-in -- in this tip. Tip
-
Governance, compliance, security: How are these network problems?
Issues of governance, compliance and security are becoming the responsibility of network operations staff because increasingly complex, componentized services are carried on the network. Network staff must cooperate with other teams to ensure good co... Tip
-
Prevent unauthorized USB devices with software restriction policies, third-party apps
In the conclusion of his series on preventing unauthorized USB device use on your network, Brien Posey discusses the pros and cons of using software restriction policies such as certificate rules, hash rules, Internet zone rules, and path rules to pr... Tip
-
Using Windows Vista group policy to prevent unauthorized USB device use
One of the largest internal threats to network security, and a major source of worry for network administrators, is the use of USB storage devices. USB storage devices can be used to steal large quantities of data from your network. Anything a user h... Tip
-
USB storage devices: Two ways to stop the threat to network security
USB storage devices pose a significant threat to network security. Disabling USB ports is an extremely effective way of preventing USB storage devices on your network; however, these sorts of techniques also prevent the use of authorized USB devices.... Tip
-
Network security: Using unified threat management (UTM)
Network security products vary in use and protection. If you're looking at options to secure your network, use this introduction on Unified Threat Management (UTM) to learn about what UTM's advantages are compared to traditional security models. Tip
Network Management Strategies for the CIO