Ask The Security Expert: Questions & Answers
Network Security
Mike Chapple is ready to answer your questions on all things network security -- from configuring a firewall to deploying a secure wireless network.
Have a question for Mike Chapple? Email editor@searchsecurity.com!

-
Securing big data: Architecture tips for building security in
Answer - Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. 28 June 2012 -
How to build C-level support for the benefits of penetration testing
Answer - Matt Pascucci offers advice on how to justify the value and present the benefits of penetration testing to corporate executives. 28 June 2012 -
Network perimeter security: How to audit remote access services
Answer - Matt Pascucci discusses the best tools to audit Internet-facing remote access services and boost network perimeter security. 28 June 2012 -
VPN troubleshooting: Isolating VPN session timeout issues
Answer - Expert Matt Pascucci offers VPN troubleshooting advice, specifically best practices for troubleshooting VPN session timeout and lockout issues. 28 June 2012 -
Use Telnet alternative SSH to thwart Telnet security risks
Answer - The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place. 23 March 2012 -
Whether to change default RDP port as a virus protection best practice
Answer - Using nonstandard ports for the RDP protocol blocks the Morto worm. But is changing port numbers a virus prevention best practice? 20 March 2012 -
Is it possible to prevent DDoS attacks?
Answer - A distributed denial-of-service (DDoS) attack can consume all your network bandwidth. Learn how to prevent a DDoS attack in this expert response. 20 March 2012 -
Cloud endpoint security: Considerations for cloud security services
Answer - Mike Chapple details discuses considerations for using cloud security services, specifically cloud endpoint security. 05 January 2012 -
Assessing smartphone eavesdropping via keyboard vibrations
Answer - Is smartphone eavesdropping via keyboard vibrations a credible enterprise threat? Mike Chapple explains. 04 January 2012 -
Wireless vs. wired security: Wireless network security best practices
Answer - Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. 07 December 2011
Security Management Strategies for the CIO