Email Alerts
-
IOS theft highlights need to patch flaws quickly
It's unclear whether future exploits resulting from last year's Cisco IOS source code theft will eventually disrupt networks worldwide, but experts agree that any IOS-related flaws must be patched quickly. Article
-
Would you consider a Microsoft VPN tunnel through a WEP encrypted access point to be secure?
Ask the Expert
-
FoundStone's SuperScan 4 lives up to its name
A review of a free IP scanning tool called SuperScan v4.0. Tip
-
Why Snort makes IDS worth the time and effort
Open source Snort is a free and powerful alternative to commercial intrusion-detection systems. Tip
-
The evolving art of networking self-defense
In today's multilevel threat environment, network security is looking less like a medieval castle and more like a highly evolved organism. Because many attacks simply can't be discovered or stopped at the traditional network edge, enterprises need to... Tech Article
-
Do blended threats call for all-in-one or best-of-breed devices?
Interop 2005 speakers say a single, comprehensive security device is the remedy for thwarting blended security threats, but others disagree. Article
-
Guide to penetration testing
This series explores penetration testing, an ethical hacking technique, to help security professionals evaluate the effectiveness of information security measures within their organizations. Tutorial
-
What issues does VoIP cause for web-filtering software?
Ask the Expert
-
Antispam approaches
Part five in our nine-part series on managing spam. Book Excerpt
-
Authentication weaknesses
This tip focuses on hardening network access against brute-force attacks. Tip
Network Management Strategies for the CIO