Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Nmap: A valuable open source tool for network security

    Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping and testing for network vulnerabilities. 

  • Using IDS as a hack detection tool

    Intrusion-detection systems (IDS) play a critical role in protecting the IT infrastructure. In this tip, security expert Michael Gregg discusses the types of IDS, how they work and how to get started finding out whether IDS is a good fit for your org... 

  • Defining adequate security controls

    Because of the changing nature of technology, the language in the Sarbanes-Oxley Act is purposefully vague. This article explores the meaning of adequate security controls and what is required for SOX compliance. 

  • Little known Microsoft security utilities

    Microsoft makes a big deal of security, but some of its useful security utilities fly under the radar. Contributor Brien M. Posey highlights a few of the more valuable Microsoft tools and provides short descriptions of each. 

  • Cleansing an infected mail server

    If your server is heavily infected, the sheer volume of infected messages can overwhelm the machine, and your antivirus software may not be able to keep pace with the server. 

  • Essential security testing tools for SMBs

    Kevin Beaver's security tool overview is jam-packed with detailed descriptions of who, what, why and how to use the tools. 

  • Network security 1-2-3

    Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget. 

  • Nessus: Vulnerability scanning in the enterprise

    General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus. 

  • Managing Nessus reports

    Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable tool. 

  • Getting started with Nessus: How to install and configure the open source vulnerability scanner

    Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security posture. This tip, the first in a series of three on Nessus...