-
How should the ipseccmd.exe tool be used in Windows Vista?
Ipseccmd is a command-line tool for displaying and managing IPsec policy and filtering rules. Expert Michael Cobb explains how to get the scripting utility to work with Vista.29 Feb 2008
-
How to protect DNS servers
The DNS database is the world's largest distributed database, but unfortunately, DNS was not designed with security in mind. Application security expert Michael Cobb explains how to keep a DNS serv...29 Feb 2008
-
Are encrypted Microsoft Word files safer in transit than PDF files?
In this expert Q&A, Michael Cobb demonstrates how a misconfigured firewall makes it easy for some Microsft Word and PDF files to be sniffed in transit.29 Feb 2008
-
House legislators rip Bush's Cyber Initiative plan
Congressional leaders were critical of the administration's efforts in overhauling and expanding the government's intrusion detection system, known as Einstein.28 Feb 2008
-
What is the best possible IDS deployment for an Enterprise Resource Planning (ERP) system?
Deploying an IDS can be a complex process. But are there specific requirements for an IDS in an ERP system? Network security expert Mike Chapple explains.28 Feb 2008
-
Sourcefire CEO to step down
Sourcefire, maker of the popular Snort open source IDS tool, said its Chief Executive E. Wayne Jackson III would step down.28 Feb 2008
-
How would you define the responsibilities of a data custodian in a bank?
Data security is incredibly important for financial institutions, and it's the data custodian's job to make sure that data is safe. Security management expert Mike Rothman explains more.27 Feb 2008
-
The security benefits and risks of virtualization
IT shops are looking at virtualization as a way to improve data security and make patch deployments more efficient. But IT pros and analysts say there are security risks as well.27 Feb 2008
-
VMware to release APIs to security vendors under VMsafe
VMware plans to release application program interfaces as part of VMsafe so security vendors could design software interoperable with its virtualization technology.27 Feb 2008
-
Data loss prevention (DLP) tools: The new way to prevent identity theft?
Despite advances in perimeter technologies, data theft has become common in today's enterprises. To protect their confidential information, some security professionals are turning to an emerging te...27 Feb 2008
-
Quiz:: Marrying security and networking tools
A five-question multiple-choice quiz to test your understanding of Sasan Hamidi's Integration of Networking and Security School lesson.27 Feb 2008
-
Screencast: Opening up the Network Security Toolkit
Tom Bowers reviews the basics of the browser-based Network Security toolkit, including proper configurations, tool selection and general usage.26 Feb 2008
-
Is DLP coming of age? Reconnex hopes to ease path
Firms have grappled with DLP, but after a hard experience, ING's Andre Gold tells why it may be ready for prime time. Meanwhile, Reconnex says its new product can ease the path.26 Feb 2008
-
Exploit code released for critical VMware flaw
A file sharing flaw in VMware can be exploited by an attacker to execute code and access sensitive files.25 Feb 2008
-
FISA: Telecoms will continue wiretap cooperation -- for now
Despite the impasse between Congress and the White House over new terrorism surveillance legislation, telecoms will continue to cooperate with government wiretaps.25 Feb 2008
-
How the China syndrome doomed 3Com merger deal
The national security anxieties that caused the collapse of a merger deal between 3Com, Bain Capital and a Chinese company were warranted, most industry experts say.21 Feb 2008
-
How helpful is the centralized logging of network flow data?
Network security expert Mike Chapple strongly recommends network flow logging as part of a well-rounded security program. There are two common pitfalls, however, that infosec professionals need to ...21 Feb 2008
-
Can Trojans and other malware exploit split-tunnel VPNs?
The beauty of split tunneling is that an enterprise doesn't need to provide the general Internet access point for a VPN user. Mike Chapple, however, also explains why split-tunnel VPNs provide a fa...21 Feb 2008
-
Should an intrusion detection system (IDS) be written using Java?
There's no reason that you couldn't implement intrusion detection functionality in any higher-level programming language, Java included. Network security expert Mike Chapple, however, explains why ...21 Feb 2008
-
Can a firewall alone effectively block port-scanning activity?
In this expert response, Mike Chapple reveals which product is the best line of defense against port scanning threats.21 Feb 2008
Security Management Strategies for the CIO