Ask the Experts
Ask the Experts
Enterprise network security
-
Does Teredo present security risks to the enterprise?
Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Ed Skoudis explains why this function isn't as innocent as it seems. Continue Reading
-
How to prevent hackers from accessing your router security password
In this Q&A, Joel Dubin unveils the best practices for protecting a router security password from compromise. Continue Reading
-
Comparing proxy servers and packet-filtering firewalls
In the world of security, judging proxy servers and packet-filtering firewalls together is like comparing apples and oranges. But that won't stop network security expert Mike Chapple from giving such comparisons a try. Continue Reading
-
Should an IT staff be concerned with a network's physical security?
Fifty feet outside of an office building may be a manhole that contains all the fiber that connects you to the outside world. In this expert Q&A, Mike Chapple has some advice: "Don't obsess about it." Continue Reading
-
Will FTP ever be a secure way to transfer files?
A SearchSecurity.com member asks our network security expert Mike Chapple: Is the File Transfer Protocol a secure way to transfer files? As one of his many monthly responses to readers, Chapple reveals a better alternative to FTP. Continue Reading
-
Why does Skype connect to so many servers?
Skype is a peer-to-peer service that uses a distributed network of "supernodes" to facilitate communication throughout the world. But is it safe to have so many "volunteer" connections? Mike Chapple explains. Continue Reading
-
Is a 'self-defending network' possible?
Is there a product available that can be plugged into your network and allow you to rest easy? Mike Chapple explains what vendors may be suggesting when they tout a 'self-defending' network. Continue Reading
-
Server considerations for internal network application setup
Looking to offer private applications to users on an internal network? In this expert response, Mike Chapple explains why you shouldn't use the same server that provides public applications. Continue Reading
-
Is it possible to identify a fake wireless access point?
A network's identity is easy to fake. If you're looking for proof of a valid access point, Mike Chapple reveals some secure wireless options. Continue Reading
-
What are the dangers of Web-based remote access systems?
Identity management and access control expert Joel Dubin discusses the security risk associated with using Web-based remote access systems, such as LogMeIn and GoToMyPC. Continue Reading
-
What is the relationship between open port range and overall risk?
Exposing a large number of well-known ports could be a substantial risk, depending upon their nature. In this expert Q&A, Mike Chapple explains why it may be best to narrow down a port range. Continue Reading
-
Will iptables screen UDP traffic?
UDP is a connectionless protocol that can't be screened using strict stateful inspection. However, most modern firewalls, including iptables, treat UDP in the same manner as a connection-oriented protocol. Mike Chapple explains the process in this ... Continue Reading
-
How expensive are IPsec VPN setup costs?
Although IPsec VPN tunnels tend to be fairly low maintenance, their setup and maintenance costs can quickly mount, depending on an enterprise's equipment. In this expert Q&A, Mike Chapple reveals how much enterprises can expect to pay on a new ... Continue Reading
-
Can Snort be configured with a FreeBSD router?
Just because you can use Snort, it doesn't necessarily mean that you always should. In this expert Q&A, Mike Chapple explains which network configuration scenarios call for the intrusion defense tool and which ones don't. Continue Reading
-
Will deploying VoIP on an 802.1x network create security problems?
Voice over IP telephony is beginning to replace traditional PBX in the enterprise. In this expert Q&A, Mike Chapple explains how the popular VoIP technology has its own unique security implications. Continue Reading