Network Security help from Information Security experts
Mike Chapple is ready to answer your questions on all things network security -- from configuring a firewall to deploying a secure wireless network.
Have a question for Mike Chapple? Email firstname.lastname@example.org!
Answer - Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. 28 June 2012
Answer - Matt Pascucci offers advice on how to justify the value and present the benefits of penetration testing to corporate executives. 28 June 2012
Answer - Matt Pascucci discusses the best tools to audit Internet-facing remote access services and boost network perimeter security. 28 June 2012
Answer - Expert Matt Pascucci offers VPN troubleshooting advice, specifically best practices for troubleshooting VPN session timeout and lockout issues. 28 June 2012
Answer - The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place. 23 March 2012
Answer - Using nonstandard ports for the RDP protocol blocks the Morto worm. But is changing port numbers a virus prevention best practice? 20 March 2012
Answer - A distributed denial-of-service (DDoS) attack can consume all your network bandwidth. Learn how to prevent a DDoS attack in this expert response. 20 March 2012
Answer - Mike Chapple details discuses considerations for using cloud security services, specifically cloud endpoint security. 05 January 2012
Answer - Is smartphone eavesdropping via keyboard vibrations a credible enterprise threat? Mike Chapple explains. 04 January 2012
Answer - Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. 07 December 2011