Blog Posts Tagged with "Network Security"


The Undervalued Security Benefits of IPsec

October 26, 2012 Added by:Rainer Enders

For too long, IPsec struggled with a reputation of being cumbersome to implement and manage. However, even amid the harshest of its critics, its ability to secure data has rarely, if ever, come into question. Now, through advancements in the technology's infrastructure, IPsec has become easy to use...

Comments  (0)


Ways You Can Secure Your Network

October 25, 2012 Added by:Drayton Graham

If you are looking to secure your network, there is more than one way to do it. A NAC solution may still be the best bet for a number of companies, but when budget and resources are limited, RJ-45 jack locks may prove a creative, inexpensive solution...

Comments  (1)


The Threat Is Real and Must Be Stopped: Clarifications And Rebuttal by an INFOSEC Professional DRAFT II

October 22, 2012 Added by:Infosec Island Admin

So far though Senator Lieberman I have only seen gross generalities out of you and others about how dire things are and how scared we all should be. Your hue and cry ultimately lacks any hard evidence for any of us to stand behind as that the issue is real and it is so prescient that action must be taken post haste...

Comments  (0)


Why Patch Management is Vital to Your Business Network Security

October 22, 2012 Added by:Dan Dieterle

Patch management systems enable you to maintain full control of your systems’ patching activities. You can deploy security patches to test machines, and then push them out to all the rest of your machines, and also run reports to ensure that you have 100% compliance across all servers and workstations...

Comments  (15)


BYOD or Rogue IT?

October 22, 2012 Added by:Bill Gerneglia

Rogue IT is the name given to the informal, ad hoc software and electronic devices brought by employees into their workplace. If IT managers are warming up to and in fact embracing BYOD are they as accepting of Rogue IT in the office? Is Rogue IT simply an extension of BYOD?

Comments  (0)


The Balancing Act: How Universities Can Prevent Malware and Enable Information Access

October 21, 2012 Added by:Paul Kenyon

Considering most universities must accommodate a network of thousands of desktops and laptops, in addition to end-users ranging from students, developers, researchers, academics and admin staff – it’s no wonder balancing security and productivity is such a complex endeavor...

Comments  (2)


Prolexic Q3 2012 ... a new generation of DDoS attacks

October 20, 2012 Added by:Pierluigi Paganini

This is significant because very few companies or organizations have the necessary network infrastructure to deal with such attacks. There might be some companies with popular websites such as Google or Facebook that are able to handle such high-bandwidth floods, but most companies are not...

Comments  (0)


Counterintelligence, False Flags, Disinformation, and Network Defense

October 17, 2012 Added by:Infosec Island Admin

I would like to clear the air here a bit on these terms and how they do really apply to the world of INFOSEC that we in this business now find ourselves in, one littered with military and spook terms that you may not be really familiar with. First off, lets look at the terms that have been thrown around here...

Comments  (1)


Network Design, Wireless Security, and Password Policies - Business Beware

October 15, 2012 Added by:Gary McCully

A while back I was on a wireless assessment in which I was able to compromise the client’s primary Windows Domain from their guest wireless network. My hope in writing this article is that organizations will take their network design, wireless security, and password policies a little more seriously...

Comments  (0)


Top Ten Ways to Prevent Data Breaches

October 11, 2012 Added by:Paul Kenyon

Users with admin rights are loose cannons -- you just don’t know when or where they are going to strike, and the results can be devastating to the company’s security infrastructure. Once a problem occurs, it often unravels into a downward spiral taking your business - and reputation - down with it...

Comments  (3)


Securing Smart Grid, SCADA, and Other Industrial Control Systems

October 11, 2012 Added by:Ben Rothke

The Stuxnet computer worm of mid-2010 was a huge wake-up call for the energy industry. It also catapulted SCADA from an obscure term to the forefront of industrial security. But nearly two years later, it is unclear if the energy sector is adequately prepared for sophisticated information security threats...

Comments  (2)


Quick and Dirty Plan for Critical Infrastructure Security Improvement

October 11, 2012 Added by:Brent Huston

I was recently engaged with some critical infrastructure experts on Twitter. We were discussing a quick and dirty set of basic tasks that could be used an approach methodology for helping better secure the power grid and other utilities. There was a significant discussion and many views were exchanged...

Comments  (0)


Somewhere Over The Rainbow – A Story About A Global Ubiquitous Record of All Things Incident

October 10, 2012 Added by:Ian Tibble

Most businesses don’t even know they were hacked until a botnet command and control box is owned by some supposed good guys somewhere, but all talk of security is null and void if we acknowledge reality here. So let’s not talk reality...

Comments  (0)


The Derecho Named Cyber

October 10, 2012 Added by:Joel Harding

The discussions we had back in the mid-90s are still ongoing, we still don’t have a proper information sharing cybersecurity bill and people still don’t trust the government to maintain their privacy. Please, members of congress and business leaders, work on cybersecurity as if our lives depend on it...

Comments  (1)


Online Banking: A Trust Opportunity to (Re)gain?

October 09, 2012 Added by:Mikko Jakonen

How come banks are telling people to maintain their security better, without putting their OWN reputation and capabilities in line with the DIRECT consequences of the change paradigm towards ‘webalized’ approach we have witnessed for years, has now resulted as poor operational security...

Comments  (0)


What’s Your Horizon of Focus for Security?

October 09, 2012 Added by:Tripwire Inc

In the corporate world, we talk a lot about corporate goals & objectives. In the US Government, you hear a lot about “The Mission,” which is the unifying goal that ties an agency (or multiple agencies) together in a shared sense of purpose. I’m a big believer in connecting our actions as information security professionals to The Mission...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »