Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
Security is the cornerstone of any remote-access implementation; it is axiomatic that good security is easily managed security. SSL VPN appliances can quickly integrate into the network, providing companies with a rapid-deployment solution without modifications or interruptions to existing application servers . . .
Business owners don't walk away from their buildings at night and leave the doors wide open. But quite a few are doing something that could become nearly as dangerous: Leaving wireless networks wide open to anyone passing by with a portable . . .
t has been little more than a year since a massive data attack struck the underpinnings of the Internet, and security experts say a more coordinated attempt could do even worse damage. On October 21, 2002, people around the world cruised . . .
In this article i will give you 8 steps, easy to follow, to minimize your Cisco router exposure, by turning off some unused services, applying some access control. Network Security is a completely changing area; new devices like IDS (Intrustion . . .
With viruses and worms popping up in the news more and more often - like the infamous Blaster worm that infested computer networks in August -security incidents seem to be increasing at an epidemic rate. According to a study by the . . .
The value of a computer's information determines its desirability as a target for hacking -- but only in part. Even valueless machines can serve as jumping-off sites for additional attacks once compromised, or be used to gather information about an ostensibly . . .
Edge-router VPN (virtual private network) capabilities are the next step in functionality from point-to-point multiservice networking. This is a big - and potentially confusing - subject because there are different types of VPNs, and these can be implemented in different ways . . .
Your identity-management system doesn't have to dictate your corporate security strategy anymore. SAML (Security Assertion Markup Language) provides a standard way to exchange authentication and authorization information between different vendors' other applications so you can switch from LDAP to RADIUS authentication, for instance, without recoding your applications.. . .
Put simply, a security operations guide is a document that clearly defines your network's security-related policies and procedures. Over the years, I've done security-related consulting for a number of organizations. In these real-world environments, I've always found that the organizations that . . .
Experts have re-emphasised the need for companies to improve their IT security infrastructures, at a recent forum in Norway. At the OECD's Global Forum on Information Systems and Network Security, Jeremy Ward, director of services development for Symantec, said that many . . .
A year after surviving a massive distributed denial-of-service attack, the Internet's root servers are better fortified against hacker activity, thanks to behind-the-scenes deployment of a routing technique known as Anycast, experts say.. . .
You can't manage what you can't see. So it's not surprising that with corporate networks congested more and more by P2P, streaming media, and other "leisure" traffic, network admins are increasingly turning to specialized network management software packages and appliances to . . .
Hackers are increasingly resorting to social engineering techniques to obtain confidential passwords, as businesses become better at locking down and patching their computer networks. And the bad news is that users are still very much the weak link when it comes . . .
According to Johna Johnson, president and chief research officer at Nemertes Research, SSL defines a secure, encrypted communications mechanism between applications, most commonly between a web browser and server, and is independent of the underlying protocols, particularly IP (see also page . . .
Retailers worldwide are making the move to wireless computing, both for the flexibility it brings to in-store operations and the speed it adds to business processes. Mobile platforms and wireless networks allow retailers to complete transactions and authorizations while collecting data . . .
Every IT department with mission-critical computer operations tries to implement security measures to protect its network from data loss, performance degradation or other damage, but such damage inevitably occurs in even the best-defended environments. Most network performance and security products report . . .
Joshua Wright, the systems engineer who created a tool that targets wireless LANs protected by Cisco Systems Inc.'s Lightweight Extensible Authentication Protocol (LEAP), said he did so to demonstrate the ease with which dictionary attacks against the protocol can crack user passwords.. . .
Computer and network security risks continue to plague IT managers and network administrators as both the sheriffs and the outlaws of security are finding new ways to penetrate and defend IT assets. It is clear that security technologies, like other IT . . .
The security firm says cyber-attackers are refocusing their efforts on PCs inside the perimeter of corporate networks Corporations should be as concerned about personal computers inside the network perimeter as those riding its boundary, warns Symantec's security team. Vincent Weafer, senior . . .
Every corporate IT department faces its share of security threats from the outside world. But contact centers face double the danger, since potential data thieves likely lurk in their own ranks as well. . .