Network Security

  • Using PEAP Wireless Authentication in a Cisco/Microsoft Network

    After recently implementing PEAP wireless authentication in our large network, I found that integration was far from seamless and required more work, and money, than originally thought.
    By Finn Orfano July 4, 2011 

  • Defending Against 802.11 Wireless Radio Frequency Jamming

    All radio communications are prone to interference, both accidental and malicious. Radio frequency jamming involves the intentional transmission of powerful interference that overpowers the receiver and drowns out the original transmission. New tactics...
    By Finn Orfano July 4, 2011 

  • The Role of Technical Standards in Computer Security

    The role of technical standards in computer security from NIST and NSA.
    By DonC July 4, 2011 


  • Are You a Bad IT Person?

    Here are eight common things you might be guilty of...
    By Charles Crust July 4, 2011 

  • Firewall Definition: Does your Business Have a Firewall?

    What if a part of of your enterprise network had a problem and you needed a way to contain this problem to that part until you can surmount it? What if you didn't want any trouble whatsoever? Wanted to control what happens in your business...
    By Ashwin Satyanarayana July 4, 2011 

  • Demystifying Unified Threat Management (UTM)

    The Unified Threat Management ( UTM) software isn't really complicated even though it has a lot of software within it, which makes it a package. So what exactly is it? How does UTM work? What does it have within it?
    By Ashwin Satyanarayana July 4, 2011 


  • Some Common Firewall Myths Exposed

    There are a few things in this world that aren't perfect -- especially human beings. Like most things, firewalls have their imperfections and are not these all-in-one solution to your security problems. Firewalls can only do certain things and not...
    By Ashwin Satyanarayana July 4, 2011 

  • What Kind of Firewall Do You Really Need?

    You know what firewalls are and you even know what they do. You have strong reasons as to why you would need them guarding your business 24/7. However, the trouble now is that there are all kinds of firewalls. How would you know which one to pick?...
    By Ashwin Satyanarayana July 4, 2011 

  • Small Business Security Basics: Functions of a Firewall

    Unlike in buildings, where you sometimes have a firewall built to sustain fire and contain it within one area, Network Security firewalls have more threats to handle than just fire (although this could be fire in a way). What are the firewalls...
    By Ashwin Satyanarayana July 4, 2011 

  • Importance of a Reliable Firewall

    Even when employing firewalls, you can still be susceptible to threats. There are at least five reasons why you must ensure that your firewall is up and running.
    By Ashwin Satyanarayana July 4, 2011 
showing 61-70 of 154 < Previous   |   page: 5   6   7   8   9  ...   |   Next >

Search