Email Alerts
-
Portable USB thumb drive encryption: Software and security policy
If you allow USB flash drives at your enterprise, encryption software and policy are a must. In this tip, learn about the best USB encryption options and how to choose one for your organization. Tip
-
Five endpoint DLP deployment data security tips
Deploying data loss prevention technology on endpoints requires a careful roll-out. Expert Rich Mogull offers five tips, including the need to start slowly with a set of power users and how to manage endpoint discovery. Tip
-
Preparing the network for a cloud computing implementation
Although a cloud provider may offer specific defenses, you are ultimately responsible for the security of your data. Michael Cobb explains how to prepare when your network infrastructure extends to the cloud. Tip
-
How to detect malicious insiders by monitoring antivirus log files
Antivirus logs can be a low-cost, low-effort approach for resource-strapped companies to look for threats posed by malicious insiders. Tip
-
How to maintain network control plane security
Use access control lists and secure configurations to maintain the security of your organization's network control plane. Tip
-
Validate your perimeter network security devices are working
Validation tests on your perimeter network security tools such as antimalware can help identify security gaps and misconfigurations. Tip
-
How to prepare for a secure network hardware upgrade
Thanks to the spread of 64-bit technologies and the growing interest in IPv6 -- not to mention the possibility of a merger or acquisition -- a major network hardware upgrade is a definite possibility for many organizations. Michael Cobb shows you how... Tip
-
Firewall rule management best practices
Given the growing complexity of firewalls, organizations often have hundreds, even thousands, of rules to review and manage. But configuration doesn't have to be overly complicated. Michael Cobb offers best practices that can allow you to make change... Tip
-
Enterprise UTM security: The best threat management solution?
Unified threat management technology is touted as the cure-all for enterprise network security. But is UTM the best product for keeping threats at bay? Expert Mike Chapple explains the pros and cons of UTM and when UTM might be right for your busines... Tip
-
Making the case for network security configuration management
Network security configuration management isn't exciting, but it's necessary to ensure attackers can't exploit an enterprise's network. In this tip, Tom Bowers explains how easily malicious hackers can infiltrate misconfigured networks, and details b... Tip
Security Management Strategies for the CIO