Email Alerts
-
Huawei router security: Is there legitimate cause for concern?
Security expert Matthew Pascucci discusses Huawei router security and offers four tips for evaluating the security of enterprise network equipment. Answer
-
Should syslog format be mandatory in a log management product?
Matt Pascucci discusses what to look for when evaluating a log management product and whether syslog format should be a requirement. Answer
-
BYOD at the NSA? Maybe someday with mobile hardware root of trust
Video: Troy Lange discusses the issues thwarting BYOD at the NSA, and talks about promising mobile security technologies like hardware root of trust. Video
-
Reassess embedded systems security in light of printer vulnerabilities
Recent high-profile printer vulnerabilities illustrate why enterprises need to be aware of embedded systems security. Expert Nick Lewis discusses. Tip
-
Exploring the security risks of network management outsourcing
Is network management outsourcing the future of network security or too great a risk? Matthew Pascucci discusses the risks and rewards. Answer
-
US-CERT warns of new Samsung, Dell printer threat
Hard-coded passwords on some Samsung and Dell printers could enable an attacker to take control of an affected device. News
-
Print-management software security starts with a private IP address
Print-management software shouldn’t provide a great risk to a company provided it uses a private IP address, says expert Mike Chapple. Answer
-
Network topology mapping: How to automate network documentation
Network topology mapping to boost security can be time-consuming. Learn how to automate network documentation with network management tools. Answer
-
Can Android virtual patching thwart Android malware attacks?
Application security expert Mike Cobb weighs the pros and cons of Android virtual patching to thwart Android malware attacks. Answer
-
VoIP eavesdropping: Hardening network security to contain VoIP risks
Mike Chapple analyzes the VoIP risks posed by implementing a VoIP network and exposes the reality of telephone eavesdropping. Tip
Security Management Strategies for the CIO