February 2009
-
February 05, 2009
05
Feb'09
Are wireless networks inherently insecure?
Wireless access protection and WPA2 are both good ways to keep networks secure, though nothing's perfect. Network security expert Mike Chapple expounds. Continue Reading
-
February 05, 2009
05
Feb'09
How to build a secure wireless connection
In this Q&A, Mike Chapple discusses some key components that will protect your wireless network from spyware, and other malicious code. Continue Reading
-
February 05, 2009
05
Feb'09
Using 802.1X to control physical access to LANs
802.1X, a port-based access control, is primarily used on WLANs to control which machines can connect to the network. However, 802.1X is gaining popularity as an access control method for wired networks. This tip outlines some stipulations for ... Continue Reading
-
February 05, 2009
05
Feb'09
What controls can compensate when segregation of duties isn't economically feasible?
Having a strong log management capability is a good way to start when security segregation isn't possible. Mike Rothman explains. Continue Reading
-
February 05, 2009
05
Feb'09
Is there a way to integrate business continuity planning and operational risk management?
In this Q&A, security management expert Mike Rothman discusses the differences between business continuity planning and operational risk management. Continue Reading
-
February 05, 2009
05
Feb'09
What is a 'top-down' IPS sensor search?
If you're a firewall guru, you're probably familiar with the "top-down" signature matching approach. In this expert Q&A, Mike Chapple explains how IPS sensors have a similar method. Continue Reading
-
February 05, 2009
05
Feb'09
What are ways to measure security risks, threats and vulnerabilities?
In this Q&A, security management expert Mike Rothman offers advice on the most effective ways to manage and access security risks, threats and vulnerabilities within an enterprise. Continue Reading
-
February 05, 2009
05
Feb'09
Writing an SLA: Points to include in an outsourcing contract
Shon Harris outlines the core items to include in a service level agreement (SLA) for an MSSP (managed security services provider). Continue Reading
-
February 05, 2009
05
Feb'09
What are the benefits of employee security awareness training?
In this Q&A, security management expert Mike Rothman discusses the short-term and long-term benefits of employee security awareness training. Continue Reading
-
February 05, 2009
05
Feb'09
Intrusion prevention management packages
Networks are continually under attack from hackers and viruses. Firewalls, anti-virus software and anti-spyware software prevent most attacks from doing any damage. But new types of attacks must be reported in a manner that makes clear to network ... Continue Reading
-
February 05, 2009
05
Feb'09
Pod slurping: The latest data threat
Allow iPods in the office? Perhaps it's time to reevaluate that device policy, as iPods pose more danger to the corporate network than it might seem. In this tip, contributor Peter Giannoulis introduces Pod slurping, the latest hacking technique, ... Continue Reading
-
February 05, 2009
05
Feb'09
How to test drive NAC without busting the budget
Implementation of network access control (NAC) is a decision that some corporations are unwilling to make. Cost, installation complications and lack of knowledge about NAC technology are all factors that have stymied enterprise adoption. In this ... Continue Reading
-
February 05, 2009
05
Feb'09
What are the risks associated with outsourcing security services?
In this expert Q&A, security management pro Mike Rothman discusses why outsourcing security services could be a bad idea. Continue Reading