Blog Posts Tagged with "Firewalls"

812d096e189ecbac061ebfe343f91e1e

Driving a Web Application Firewall Toward Better Security

May 10, 2012 Added by:Andrew Sanicola

Web app firewalls can be a useful ally toward greater security for those who know how to use them properly. Whether you’re in the market for a new firewall or are already an owner, understanding it is a tool designed to be driven is an important step toward increased security...

Comments  (0)

2e541940bc9b12ea62726bb51ed8787d

Firewalls: Stop Blocking by IP and Port

May 08, 2012 Added by:Phil Klassen

There has been some good discussions on firewalls, and the majority of the feedback is that firewalls are still an important part of the security infrastructure. However, I am surprised that the discussion revolves around legacy features and not those required to meet today's needs...

Comments  (3)

1de705dde1cf97450678321cd77853d9

A Tribute to Our Oldest and Dearest Friend - The Firewall Part 2

May 06, 2012 Added by:Ian Tibble

Nine times out of ten, when you ask to see firewall rules, faces will change in the room from "this is a nice time wasting meeting, but maybe I'll learn something about security" to mild-to-severe discomfort. Discomfort - because there is no hiding place any more...

Comments  (0)

B9d9352326e5421a02e698a51d10ad2c

Firewalls and Anti-Virus Aren't Dead - Should They Be?

May 04, 2012 Added by:Beau Woods

Decreasing the effectiveness of firewalls and antivirus in is the way they're used. Because of the massive number of connections in and out of a network, definitions of what is and is not allowed and exactly how to allow or deny network connections have become a sprawling mess...

Comments  (4)

Ebe141392ea3ebf96ba918c780ea1ebe

Why We Still Need Firewalls and AV

May 02, 2012 Added by:Wendy Nather

It's become trendy to talk about how ineffective some commoditized security products are, classic firewalls and AV being the poster children. One of Josh Corman's favorite points is that "we never retire any security controls." As I am of Josh, I think he's wrong on this...

Comments  (2)

924ce315203c17e05d9e04b59648a942

Tearing Away the Veil of Hype from Palo Alto Networks’ IPO

April 24, 2012 Added by:Richard Stiennon

At long last the much hyped Palo Alto Networks (PAN) has filed its S-1 in preparation for an IPO. Now that we have some visibility into PAN’s real finances it is time to address some of their claims, and perhaps throw cold water on the exuberance being expressed in some circles...

Comments  (0)

1de705dde1cf97450678321cd77853d9

A Tribute to Our Oldest and Dearest Friend - The Firewall

April 22, 2012 Added by:Ian Tibble

We have a lot of bleeding edge software and hardware products in security backed by fierce marketing engines which set unrealistic expectations. Out of all these products, the oldest carries the highest bang for our bucks - the firewall...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

On Network Segmentation Faults

April 10, 2012 Added by:Jack Daniel

Why should you segment? Network and systems management can be enhanced by segmentation and isolation, as can performance- patch and systems management servers, departmental servers, printers and more can be placed in the most advantageous segment of the network...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Beyond the Firewall – Data Loss Prevention

April 05, 2012 Added by:Danny Lieberman

It doesn’t matter how they break into your network or servers – if attackers can’t take out your data, you’ve mitigated the threat. This paper reviews the taxonomies of advanced content flow monitoring that is used to audit activity and protect data inside the network...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain Three: Telecoms and Network Security

March 19, 2012 Added by:Javvad Malik

Network security is so important yet because it’s complex, a lot of companies end up doing it wrong. Not as many people properly understand the security implications of the network and most companies don’t even know what their network is comprised of...

Comments  (1)

39728eff8ac87a48cfb050f0df29ceaa

IBM Got it Wrong: It’s Not about Adding Another Data Source

March 13, 2012 Added by:John Linkous

For the majority of organizations, information security is more post mortem than critical care. Regardless of how many billions you spend on security tools, until you fix this inherent problem in traditional SIEM tools, large organizations will continue to be breached...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

A Structured Approach to Handling External Connections

February 27, 2012 Added by:Enno Rey

The approach to be developed is meant to work on the basis of several types of remote connections in which each determines associated security controls and other parameters. At the first glance, not overly complicated, but – as always – the devil is in the details...

Comments  (0)

37d5f81e2277051bc17116221040d51c

One in Three Massachusetts Residents’ Records Breached

February 15, 2012 Added by:Robert Siciliano

Massachusetts has one of the most stringent data protection laws on the books. Companies are now reporting when even a single individual’s information has been compromised. Despite strict security requirements, companies are continually being hacked in record numbers....

Comments  (0)

959779642e6e758563e80b5d83150a9f

The Valley of Death Between IT and Security

February 03, 2012 Added by:Danny Lieberman

Truly – the essence of security is protecting the people who use a company’s products and services. What utility is there in running 24×7 systems that leak 4 million credit cards or developing embedded medical devices that may kill patients?

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Looking Back: A Review of Threats Faced in 2011

February 02, 2012 Added by:Simon Heron

There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

When a Tool Becomes a Weapon

February 01, 2012 Added by:Alan Woodward

The Metasploit Project is an extremely valuable tool. However, a recent development which was revealed demonstrates just how easily the Metasploit Framework can be used to develop malicious payloads that avoid detection by the usual Anti-Virus and Firewall software...

Comments  (1)

Page « < 1 - 2 - 3 > »