Email Alerts
-
Eight reasons to plan out your security testing
You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In this article he discusses eight reasons why you need t... Tip
-
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. Tip
-
The most important security lesson for employees
Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions for preventing the manipulation of your employees, in ... Tip
-
Wireless LAN management: Managing security compliance
Find out the security threats that need to be addressed to make your network compliant with security regulations. Tip
-
Five common insider threats and how to mitigate them
Users can be an enterprise's best defense or its worst enemy. They have access to valuable network resources and information that can be used for ill-gain, be it accidentally or intentionally. This tip explains five common insider threats and offers ... Tip
-
How to stop a rogue user from circumventing network security
An end user with "super user" access poses a great danger to your network. In this tip, security practitioners share best practices, tools and tactics to monitor and limit user activity, and offer preventative methods to ensure that this scenario doe... Tip
-
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. Tip
-
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail through an intermediate mail server or reroute your u... Tip
-
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same.... Tip
-
Avoiding open relays
Getting on a spam blacklist can cause an annoying and crippling e-mail outage. One of the keys to staying off blacklists is making sure your e-mail system doesn't turn into an open relay. Tom Lancaster shows you how in this tip. Tip
Network Management Strategies for the CIO