Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • New security features in Internet Explorer 7

    In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but this tip will introduce you to some of its new security... 

  • Hack your storage network in the name of increased security

    Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discovered otherwise. 

  • Custom network security policy checklist

    A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create and enforce your own custom security policy for all of... 

  • Eight reasons to plan out your security testing

    You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In this article he discusses eight reasons why you need t... 

  • Designing a DMZ and using iptables

    Our editors posted a question on ITKnowledge Exchange to help out "Ruhi" plan for a DMZ using iptables, and fellow techies jumped in to help out, providing excellent advice for DMZ design. 

  • Using Snort, Nessus and Tripwire for network security

    Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. 

  • Two-factor authentication and compliance: What it is and isn't

    The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is open to interpretation. 

  • How to ensure your next firewall isn't a dud

    A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense of security. Following a few simple steps when selecti... 

  • Protecting your network against spoofed IP packets

    These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The files residing on those servers often lie behind an intri... 

  • What to do when you've been hacked

    Network hacking attacks are more common that most of us would like to admit. In the second installment of his series on managing secure networks, Michael Gregg looks at six questions you need to ask of your organization if you've been hacked, and sug...