Email Alerts
-
Cisco, SAP team-up marries network with risk management
Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals. Article
-
Introduction to Network Protection - Protect Your Windows Network from Perimeter to Data, Chapter 1
Introduction to Network Protection from 'Protect Your Windows Network from Perimeter to Data' by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing security and usability/usefulness. Chapter Download
-
BackTrack: The gotta-have, free, network security tool you've never heard of
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Tip
-
Network visibility thwarts crime, identifies unwanted traffic
Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters. Article
-
Difference between audits, assessments and pen tests
Gregg distinguishes the differences between audits and assessments. Ask the Expert
-
What structure can I follow for penetration testing?
In this question, Michael Gregg discusses the basics of penetration testing on your network. Ask the Expert
-
Network Defenders
The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users ... Article
-
Guide to network security
This guide introduces you to the main components in whole network security. You'll find articles, tutorials, tips, tools, white papers and more to pump up your network security quickly. Learning Guide
-
Network security vs. network performance -- the line is blurring
Securing your network is vital to your organizations livelihood, survival and future. But often, while securing the network, network performance is affected in adverse ways. Finding a happy medium between these two technologies -- and very often sepa... Perspective
-
Detecting hack attacks: Application logging is critical
Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a crucial addition to every organization's security st... Tip
Network Management Strategies for the CIO