Email Alerts
-
Network security: Empower users without endangering IT
Like it or not, the security of a network often depends on the participation of end users. Rather than developing an "us vs. them" mindset, you can empower your users with the right policies, guidelines and access methods. In this tip, learn 10 ways ... Tip
-
Secure Cisco routers against IOS flaw attack
Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this vulnerability, including steps to disabl... Tip
-
Reduce branch office threats in 10 steps
Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 surefire ways to reduce or mitigate them. Tip
-
Content filtering -- Taming the wild Web
Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privileges by downloading pornography or pirated software. E... Tip
-
Phishers and spambots -- appliances that fight back
Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security appliance and addresses what specifically to look for ... Tip
-
Intrusion detection systems -- introduction to IDS and IPCop
This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious ... Tip
-
Security Spotlight: SSL VPN appliances simplify secure access
By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and data. In this tip, Lisa Phifer explores why you shou... Tip
-
OSI: Securing the Stack, Layer 3 -- The role of ICMP
Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer. Tip
-
Security Spotlight: Network Behavior Analysis goes long and wide
Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, worm outbreaks and employee abuse. Learn more in this ... Tip
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Tip
Network Management Strategies for the CIO