Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Patch management: A preventive process

    Patch management is more than a one-time fix. Michael Gregg offers advice and tips on how to create a proactive patch management process to protect your networks. 

  • Essential security testing tools for SMBs

    Kevin Beaver's security tool overview is jam-packed with detailed descriptions of who, what, why and how to use the tools. 

  • Prevent network spoofing: Policies and ACLs

    Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how implementing a good firewall security policy and a si... 

  • Introduction to Ethical Hacking - from Hacking For Dummies

    This chapter from Hacking For Dummies by Kevin Beaver helps security professionals understand how malicious users think and work, enabling them to defend their systems against attacks and to identify security vulnerabilities. 

  • Nessus: Vulnerability scanning in the enterprise

    General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus. 

  • Managing Nessus reports

    Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable tool. 

  • Getting started with Nessus: How to install and configure the open source vulnerability scanner

    Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security posture. This tip, the first in a series of three on Nessus... 

  • Fighting wireless DoS attacks

    Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th... 

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... 

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a...