Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
If you've delayed setting up a wireless network because of security concerns, help is at hand. Around the time you read this, improved security technology for all variants of 802.11 should be available as free firmware downloads from most equipment vendors. . . .
Mike Outmesguine leans against a Chevy Suburban packed with Wi-Fi, GPS and ham radio gadgets, gazing out at the necklace of hilltop radio towers that surround Los Angeles' Chinatown. "The cool thing about war driving is that it makes what's . . .
It's no secret that Wi-Fi LAN security is in a fairly abysmal state. Wi-Fi Protected Access is a security mandate that could prompt even lax companies to upgrade their systems. Any business running Wi-Fi LANs should upgrade to Wi-Fi Protected . . .
There's no doubting the hipness of wireless hot spots. Thanks to Wi-Fi technology, tech-savvy people can jack into the Net at Starbucks coffeehouses or on Lufthansa Airlines or at upscale hotels across the nation. In corporate America, Wi-Fi has the potential . . .
The recently discovered Stumbler network-mapping tool represents a variety of malware that leaves enterprises with little in the way of defense, other than to lock down networks and employ intrusion detection, experts said. At first, some researchers considered Stumbler a . . .
Wi-Fi networks have, up until this point, been a bit like the Wild West: exciting, but difficult to control and keep safe. Now, a host of new management and security options are springing up as Wi-Fi penetrates corporate environments. Read on . . .
Welcome back to the Sysadmin's Corner and the continuing saga of secure communications, SSH-style. Logging in to an SSH server is easy enough and provides you with secure communications, while still opening you up to the whole world. You could set . . .
If you've ever accessed the Internet from an office environment, chances are your communications passed through a proxy. In the next few articles, I'll discuss the advantages of using a proxy and demonstrate the configuration of several proxies available from FreeBSD's . . .
Security experts finally have a handle on mystery malware that was generating loads of suspicious IP traffic over the last few weeks. Researchers at Internet Security Systems Inc. say the culprit, which was first thought to be a new breed . . .
NTSecurity writes, "Port scanning offers security professionals and systems administrators a fast and effective way to identify which services or applications their servers have open to the Internet or another network. Complex OSs, such as Windows 2000, support applications that can . . .
Why haven't enterprises already done defense-in-depth? We found six barriers to pushing firewall technology to the port level. Cost. The cost of adding firewall "brains" to the inside of the network is substantial, especially compared to the continued cost reduction of . . .
Open relay spam is dying out as a problem, according to a survey published today that is likely to raise eyebrows in the spam-fighting community. Only one per cent of corporate UK mail servers tested by security testing firm NTA . . .
We challenged networking and firewall vendors to design an enterprise that's secure from the perimeter to the core. Their responses give us a glimpse into the future of network security. Remote connectivity, partner extranets, supply chains, on-site consultants, partners and . . .
SecurityFocus.com writes, "The impact of worms on the Internet has increased significantly over the past five years. In particular worms such as CodeRed II, NIMDA, and the more recent SQL Slammer prove that the ability to effectively impact . . .
Chris Lowth submits, Network security administrators sometimes need to be able to abort TCP/IP connections routed over their firewalls on demand. This would allow them to terminate connections such as SSH tunnels or VPNs left in place by employees over night, abort hacker attacks when they are detected, stop high bandwidth consuming downloads - etc. There are many potential applications.. . .
Tools that do operating system fingerprinting are a hacker's dream. They make it ridiculously simple to identify easy targets. Run Nmap against a target, learn what OS version it's running, and then look for a set of attack tools that can . . .
All networks are susceptible to eavesdroppers and gatecrashers. The key difference between the WLAN industry and the larger Internet community is that wireless vendors understand they can no longer get by with half measures. WLANs are not inherently insecure. There is . . .
As a modern IT professional you've done all the right things to keep the "bad guys" out: you protected your network with firewalls and/or proxies, deployed anti-virus software across all platforms, and secured your mobile workstations with personal firewalls. You may . . .
Michael Mimoso submits, Formerly with the National Security Agency and Secret Service, Gartner Inc. vice president John Pescatore has the perspective and experience to comment on just about everything related to IT security. In this interview, conducted during the Gartner IT Security Summit, Pescatore lends his two cents on security spending, trends, cyberterrorism, government's role in security and what enterprises need to do safely stay afloat.. . .
Wireless LANs have been billed as the great security wasteland. But thanks to the 802.11b Wi-Fi community's frenetic activity in the last year, an abundance of good security choices now exist, with more on the way. Wi-Fi security efforts . . .