Email Alerts
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th... School
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... School
-
Auditor's office wards off potential wireless threats
Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly. Article
-
New security features in Internet Explorer 7
In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but this tip will introduce you to some of its new security... Tip
-
Hack your storage network in the name of increased security
Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discovered otherwise. Tip
-
Custom network security policy checklist
A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create and enforce your own custom security policy for all of... Tip
-
Data theft prompts firm to lock down, protect network
After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network core or perimeter. Article
-
How do virus-infected e-mails get past a firewall?
How do virus-infected e-mails get past a firewall? Ask the Expert
-
Eight reasons to plan out your security testing
You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In this article he discusses eight reasons why you need t... Tip
-
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. Tip
Network Management Strategies for the CIO