Email Alerts
-
Getting along with the security pros
As a networking professional, you can't just focus on the nuts and bolts (or bits and bytes) end of what you do. As a high-level network engineer or manager, you will need to establish and maintain relationships with other departments in your company... Tip
-
Intrusion prevention management packages
Networks are continually under attack from hackers and viruses. Firewalls, anti-virus software and anti-spyware software prevent most attacks from doing any damage. But new types of attacks must be reported in a manner that makes clear to network man... Tip
-
Minimize Windows security testing's impact on performance
Testing security is a good thing, but if you're not careful you could adversely affect your Windows networks and systems. Contributor Kevin Beaver has extensive security testing experience and tells you how and when to test to ensure the slightest ne... Tip
-
How to (really) harden Windows clients
Hardening Windows clients with a long checklist or an auditor's suggestions might be overkill according to contributor Kevin Beaver. Take a look at his bare-minimum checklist and his recommendations for hardening clients according to vulnerability as... Tip
-
Nmap: A valuable open source tool for network security
Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping and testing for network vulnerabilities. Tip
-
Using IDS as a hack detection tool
Intrusion-detection systems (IDS) play a critical role in protecting the IT infrastructure. In this tip, security expert Michael Gregg discusses the types of IDS, how they work and how to get started finding out whether IDS is a good fit for your org... Tip
-
Defining adequate security controls
Because of the changing nature of technology, the language in the Sarbanes-Oxley Act is purposefully vague. This article explores the meaning of adequate security controls and what is required for SOX compliance. Tip
-
Little known Microsoft security utilities
Microsoft makes a big deal of security, but some of its useful security utilities fly under the radar. Contributor Brien M. Posey highlights a few of the more valuable Microsoft tools and provides short descriptions of each. Tip
-
Cleansing an infected mail server
If your server is heavily infected, the sheer volume of infected messages can overwhelm the machine, and your antivirus software may not be able to keep pace with the server. Tip
-
Essential security testing tools for SMBs
Kevin Beaver's security tool overview is jam-packed with detailed descriptions of who, what, why and how to use the tools. Tip
Network Management Strategies for the CIO