Network Security Best Practices and Products
- February 11, 2009
Even if a company buys the latest security products and adheres to data security standards, IT professionals must also consider physical network security to close off avenues of potential data leakage. Think outside the box of the standard network ...
- January 14, 2009
This year's PCI compliance update puts the focus on pesky WEP access points and tightens some unclear language about wireless LAN. Not paying close attention to the details, however, could land retailers in hot water.
- January 07, 2009
More IT organizations are starting to run industrial Supervisory Control and Data Acquisition (SCADA) systems over the corporate network to save money and to boost bandwidth. However, these industrial control networks are extremely sensitive. Proper...
- December 29, 2008
Vyatta Inc. debuts its third open source router and security networking appliance in less than nine months, edging further into the enterprise space.
- November 13, 2008
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data.
- November 12, 2008
More than 1.3 million DNS servers are still exploitable by the Kaminsky vulnerability, according to new research from vendors Infoblox and DNSstuff.
- October 30, 2008
When Concord Hospital needed to install a network behavioral analysis (NBA) tool into a Nortel network built on multi-link trunking, the hospital's network chief had to convince Nortel to collaborate with his preferred NBA vendor.
- October 23, 2008
Cisco security guru Christopher Burgess has some radical suggestions for network security to beef up data leak prevention: Trust your users, and let them help decide policy.
- October 01, 2008
Workers in developing countries like India, China and Brazil can undermine data loss prevention efforts. A network security survey from Cisco shows that these workers are more likely to engage in risky behavior with corporate data. Education is the ...
- September 25, 2008
Overwhelmed by threats, security practitioners are turning toward an unlikely source: the unwashed masses. Don't be surprised if crowdsourcing starts influencing your NOC operations soon, either.
- August 14, 2008
With security information and event management platform QRadar, Wayne State University has secured its open network without locking down its systems.
- May 14, 2008
Most network security products focus on keeping the bad guys -- Trojans, viruses and hackers -- outside of the network, but data loss prevention (DLP) keeps the good stuff -- sensitive enterprise data -- in. With more business data leaks tainting ...
- February 14, 2008
Many IT administrators have been able to save time and boost productivity by using VanDyke Software's security management products.
- February 06, 2008
With businesses expecting their networks to provide more services, vendors are building more intelligence into their switches.
- January 09, 2008
The post-holiday influx of consumer devices poses increased risk of data leakage and other threats to network security.