Email Alerts
-
Hardening your router in 9 easy steps
For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly conf... Tip
-
Surefire network security strategies
Tired of fighting the latest worms and viruses? Following our preventative steps can make your network more resistant and fend off future problems. Tip
-
Maximizing IDS/IPS implementations
This tip looks at problems administrators face when implementing IDS/IPS systems and provides suggestions on how to increase the amount of valid information they provide. Tip
-
Testing Group Policy security
So you've hardened Group Policy settings to protect Windows from attacks -- but are you sure all of those settings are working? Contributor Kevin Beaver offers several methods for testing Group Policy. Tip
-
How to choose a firewall
Despite the development and evolution of security technologies, the firewall remains a vital component of any network architecture, and today's organizations have myriad options to choose from. This tip outlines five basic questions you should ask wh... Tip
-
Popular VLAN attacks and how to avoid them
Learn how to secure a VLAN from popular attacks such as the VLAN hopping attack. Tip
-
FoundStone's SuperScan 4 lives up to its name
A review of a free IP scanning tool called SuperScan v4.0. Tip
-
Network device management systems: Simplifying the buying process
Learn how the use of a spreadsheet can simplify the process of buying a network device management system. Tip
-
How to handle network design with switches and segments
Expert JP Vossen explains how to handle switches and segments in conjunction with network-based IDS. Tip
-
Securing DNS with protocol extensions
The inherent security gaps in DNS and recent efforts to close them with protocol extensions. Tip
Network Management Strategies for the CIO