Email Alerts
-
Phishers and spambots -- appliances that fight back
Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security appliance and addresses what specifically to look for ... Tip
-
Intrusion detection systems -- introduction to IDS and IPCop
This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious ... Tip
-
Security Spotlight: SSL VPN appliances simplify secure access
By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and data. In this tip, Lisa Phifer explores why you shou... Tip
-
OSI: Securing the Stack, Layer 3 -- The role of ICMP
Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer. Tip
-
Security Spotlight: Network Behavior Analysis goes long and wide
Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, worm outbreaks and employee abuse. Learn more in this ... Tip
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Tip
-
BackTrack: The gotta-have, free, network security tool you've never heard of
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Tip
-
Data destruction
How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Contributor Brien Posey explains the need for proper data... Tip
-
Network intrusion prevention: An allegory
Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach. Tip
-
Network Access Quarantine Control vs. Network Access Protection
With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with the forthcoming NAP program and advises on if and when... Tip
Network Management Strategies for the CIO