Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tip
04 Dec 2024
How to recover from a DDoS attack
Learn how to recover from a DDoS attack and get operations back online quickly, while minimizing impact on customers and brand reputation. Continue Reading
By -
Tutorial
21 Nov 2024
How to test firewall rules with Nmap
Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
03 Aug 2006
VPNs for disaster recovery: IPsec vs. SSL
Using a VPN as a failover mechanism when a primary communications link may be unavailable due to a disaster can be a smart move -- as well as an easy one to implement. In this tip, learn about the pros and cons of IPsec and SSL VPN options for disaster recovery. Continue Reading
By- Justin Korelc and Ed Tittel
-
Tip
22 Jun 2006
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch out for during the process. Continue Reading
-
Tip
07 Jun 2006
Five steps to stamp out unsafe Wi-Fi use
Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. Continue Reading
By- Lisa Phifer, Core Competence
-
Feature
10 Apr 2006
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects, and what network administrators should consider before activating them. Continue Reading
-
Feature
10 Apr 2006
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
15 Mar 2006
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. Continue Reading
-
Tip
02 Jan 2006
OSI: Securing the Stack, Layer 5 -- session hijacking
To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security concern at the session layer -- Layer 5 of the OSI model. Continue Reading
By- Michael Gregg, Superior Solutions, Inc.
-
Tip
02 Dec 2005
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. Continue Reading
By- Chris Cox
-
Tip
31 Oct 2005
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail through an intermediate mail server or reroute your users to an exact replica of a popular Web site, where their keystrokes, including account names and passwords, are captured. In this tip, Cricket Liu provides a checklist of measures you can take to secure your DNS infrastructure. Continue Reading
By- Cricket Liu, Infoblox
-
Tip
20 Oct 2005
VPN security: Where are the vulnerabilities?
SOX compliance mandates have pushed organizations to deliver end-to-end VPN security. This means that the VPN itself is no longer enough. Robbie Harrell explains how organizations can apply security policies to the VPN in this tip. Continue Reading
By- Robbie Harrell
-
Tip
11 Oct 2005
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same. Learn the differences between IDS and IPS, and which is right for your network, with this expert tip. Continue Reading
By -
Answer
08 Sep 2005
Which transmission media are the most secure and the least secure?
By- Michael Gregg, Superior Solutions, Inc.
-
Answer
28 Aug 2005
How to protect your network from broadcast and multicast storms
What methods are available to protect a network from broadcast and multicast storms? Continue Reading
By- Puneet Mehta, SDG
-
Tip
23 Aug 2005
Hardening your router in 9 easy steps
For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly configured router is only marginally better than having no security in place at all. This expert tip presents nine easy steps that you can take to ensure that your router is adequately protected. Continue Reading
By- Chris Cox
-
Feature
18 May 2005
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
- Answer 12 Apr 2005
-
Feature
14 Feb 2005
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
- Answer 09 Nov 2004
- Answer 12 Oct 2004
-
Tip
10 Aug 2004
Run your VoIP calls over a VPN for enhanced security
A look at using a VPN to enhance VoIP security. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
15 Jun 2004
How can we increase our VPN connection speed?
We recently purchased a new software R&D system to allow our offices in New Jersey and Canada to link up. In order to secure the data we setup VPN's for every computer connecting to the server at the main office. Everyone who connects using a VPN is complaining that the connection is very sluggish even though they all use DSL or a cable modem. Can you please give me some insight into how I can help these users connect faster? Continue Reading
By- Lisa Phifer, Core Competence
- Answer 12 May 2004
-
Tip
27 Apr 2004
Layer 3 MPLS VPNs
A look at some of the details of Layer 3 MPLS VPNs. Continue Reading
By- Robbie Harrell
-
Tip
02 Mar 2004
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations. Continue Reading
By- Atif Azim, Vice President of Solutions, Perfigo, Inc.
- Answer 08 Sep 2003
-
Feature
24 Feb 2003
Network Security Principles and Practices: Secure LAN switching
This book excerpt offers steps you can take to make Layer 2 environments and switches more secure, including permit lists, protocol filtering and VLANs. Continue Reading