March 2009
-
March 05, 2009
05
Mar'09
Buying an IPS: Test using your network and traffic
Testing an intrusion prevention system is the critical final piece of an IPS purchase. This is the last of a seven-part series. Continue Reading
-
March 05, 2009
05
Mar'09
Buying an IPS: Determine your management requirements
Be sure to match your IPS management requirements to the product you choose, otherwise your deployment will fail. This is the sixth of a seven-part series. Continue Reading
-
March 05, 2009
05
Mar'09
TrueCrypt brings affordable laptop encryption to midmarket
TrueCrypt is free, open source laptop encryption software whose cryptographic capabilities and methodology compares to commercial products. Continue Reading
-
March 04, 2009
04
Mar'09
Quiz: Building an identity and access management architecture
Find out how much you've learned about building an identity and access management architecture in Identity and Access Management Security School. Continue Reading
-
March 02, 2009
02
Mar'09
Consider a compliance-driven security framework
Midmarket companies bound to regulations such as PCI DSS, HIPAA and Sarbanes-Oxley should consider using these requirements as the basis for their security programs. Continue Reading
-
March 02, 2009
02
Mar'09
Turn your $34.99 router into a firewall
Converting a small-office network router into a firewall is one way a midmarket organizations can leverage existing infrastructure for security. Continue Reading
-
March 02, 2009
02
Mar'09
Handling the politics of network access control policies
Midmarket IT staffs need to think beyond network security policies in a NAC rollout, and take into consideration business needs such as HR policies, compliance mandates and partner relationships. Continue Reading
-
March 02, 2009
02
Mar'09
How to handle noncompliant network machines
There are four options for network administrators when it comes to dealing with network devices that do not comply with policy. Continue Reading
-
March 02, 2009
02
Mar'09
How many firewalls do you need?
Whether your organizations needs multiple sets of firewalls depends on whether they will protect clients, servers or both and what kind of traffic they will monitor. Continue Reading
-
March 02, 2009
02
Mar'09
Book Chapter: Hacking Windows
This chapter excerpt from Hacking Exposed, Sixth Edition by Stuart McClure, Joel Scambray and George Kurtz will explain the history of Windows security, and also why Windows hacking is so prevalent. Download the .pdf of the entire chapter so you can... Continue Reading
-
March 02, 2009
02
Mar'09
From the gateway to the application: Effective access control strategies
Organizations need to strike a balance between so-called front-door access control and more fine grained controls established within an application itself. This article discusses the difference between products designed to set access at the gateway ... Continue Reading
-
March 02, 2009
02
Mar'09
Questions to ask when choosing your managed security service provider
Outsourcing security services forces midmarket IT organizations to ask tough questions about a provider's capabilities and business model. Continue Reading
-
March 01, 2009
01
Mar'09
Safe but simple wireless authentication
WLAN administrators need to understand the authentication options available to them, such as pre-shared keys and 802.1X, as well as the risks present in those options. Continue Reading
-
March 01, 2009
01
Mar'09
Choosing midmarket wireless authentication server infrastructure options
RADIUS servers don't have to be out of the price range of midmarket organizations; alternatives such as extending Windows infrastructure or outsourcing bring enterprise-grade infrastructure to smaller companies. Continue Reading