Email Alerts
-
Two-factor authentication and compliance: What it is and isn't
The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is open to interpretation. Tip
-
How to ensure your next firewall isn't a dud
A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense of security. Following a few simple steps when selecti... Tip
-
Protecting your network against spoofed IP packets
These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The files residing on those servers often lie behind an intri... Tip
-
What to do when you've been hacked
Network hacking attacks are more common that most of us would like to admit. In the second installment of his series on managing secure networks, Michael Gregg looks at six questions you need to ask of your organization if you've been hacked, and sug... Tip
-
Using Netsh with Windows Firewall
This tip examines how to configure and troubleshoot Windows Firewall using the Netsh command-line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1 operating system platforms. Tip
-
Application firewall tips and tricks
Network firewalls only examine packet information at the transport layer and below. For a more thorough examination of network traffic, organizations can deploy application firewalls, which work at the application layer of the TCP/IP stack to interce... Tip
-
How to use IPsec filtering rules to filter network traffic
Learn how to control what enters and exits your PCs by using IPsec filtering rules to filter particular protocol and port combinations for both inbound and outbound network traffic. Tip
-
Guide to intrusion detection and prevention
This guide covers intrusion detection and prevention. Tip
-
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. Tip
-
Cisco PIX ASDM: How to install
Learn some helpful hints for installing and troubleshooting Cisco's Adaptive Security Device Manager (ASDM) for PIX firewalls in this two-part tip. Tip
Network Management Strategies for the CIO