Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tutorial
21 Nov 2024
How to test firewall rules with Nmap
Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
18 Nov 2024
What CISOs need to know to build an OT cybersecurity program
More companies are tasking CISOs with operational technology security. But this oversight means a new strategy for those unfamiliar with building an effective OT security program. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Sharon Shea, Executive Editor
-
Tip
20 Oct 2005
VPN security: Where are the vulnerabilities?
SOX compliance mandates have pushed organizations to deliver end-to-end VPN security. This means that the VPN itself is no longer enough. Robbie Harrell explains how organizations can apply security policies to the VPN in this tip. Continue Reading
By- Robbie Harrell
-
Tip
11 Oct 2005
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same. Learn the differences between IDS and IPS, and which is right for your network, with this expert tip. Continue Reading
By -
Answer
08 Sep 2005
Which transmission media are the most secure and the least secure?
By- Michael Gregg, Superior Solutions, Inc.
-
Answer
28 Aug 2005
How to protect your network from broadcast and multicast storms
What methods are available to protect a network from broadcast and multicast storms? Continue Reading
By- Puneet Mehta, SDG
-
Tip
23 Aug 2005
Hardening your router in 9 easy steps
For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly configured router is only marginally better than having no security in place at all. This expert tip presents nine easy steps that you can take to ensure that your router is adequately protected. Continue Reading
By- Chris Cox
-
Feature
18 May 2005
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
- Answer 12 Apr 2005
-
Feature
14 Feb 2005
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
- Answer 09 Nov 2004
- Answer 12 Oct 2004
-
Tip
10 Aug 2004
Run your VoIP calls over a VPN for enhanced security
A look at using a VPN to enhance VoIP security. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
15 Jun 2004
How can we increase our VPN connection speed?
We recently purchased a new software R&D system to allow our offices in New Jersey and Canada to link up. In order to secure the data we setup VPN's for every computer connecting to the server at the main office. Everyone who connects using a VPN is complaining that the connection is very sluggish even though they all use DSL or a cable modem. Can you please give me some insight into how I can help these users connect faster? Continue Reading
By- Lisa Phifer, Core Competence
- Answer 12 May 2004
-
Tip
27 Apr 2004
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs. Continue Reading
By- Robbie Harrell
-
Tip
02 Mar 2004
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations. Continue Reading
By- Atif Azim, Vice President of Solutions, Perfigo, Inc.
- Answer 08 Sep 2003
-
Feature
24 Feb 2003
Network Security Principles and Practices: Secure LAN switching
This book excerpt offers steps you can take to make Layer 2 environments and switches more secure, including permit lists, protocol filtering and VLANs. Continue Reading