May 2005
-
May 05, 2005
05
May'05
How to handle network design with switches and segments
Expert JP Vossen explains how to handle switches and segments in conjunction with network-based IDS. Continue Reading
-
May 05, 2005
05
May'05
Network device management systems: Simplifying the buying process
Learn how the use of a spreadsheet can simplify the process of buying a network device management system. Continue Reading
-
May 05, 2005
05
May'05
Where to place IDS network sensors
JP Vossen explains where to place IDS sensors. Continue Reading
-
May 05, 2005
05
May'05
Using IDS rules to test Snort
Here are several methods for testing Snort over the wire to ensure it's working properly in your environment. Continue Reading
-
May 05, 2005
05
May'05
How to determine network interface cards for IDS sensors
In this tip, JP Vossen offers advice about choosing and configuring interfaces for an IDS sensor. Continue Reading
-
May 05, 2005
05
May'05
Checklist for building better software
Learn how to reduce the number of security vulnerabilities introduced to software during the development process. Continue Reading
-
May 05, 2005
05
May'05
Finding an OS for Snort IDS sensors
JP Vossen offers his advice on choosing an OS for Snort sensors. Continue Reading
-
May 04, 2005
04
May'05
Step 4: Maintain policies for acceptable use of Bluetooth-enabled devices
-
May 04, 2005
04
May'05
Spyware in 87% of corporate PCs
A new Webroot report backs other recent studies that say spyware has a chokehold on a majority of machines. Continue Reading
-
May 04, 2005
04
May'05
Step 2: Disable Bluetooth whenever possible
-
May 04, 2005
04
May'05
Step 5: Educate end users with targeted guides
-
May 04, 2005
04
May'05
Step 1: Know Bluetooth vulnerability lingo
-
May 04, 2005
04
May'05
Step 3: Require authentication and encryption
-
May 04, 2005
04
May'05
Learning guide: The five steps of baseline Bluetooth security
In this five step Learning Guide, you will learn the Bluetooth security basics, including how to protect against a Bluetooth hack or virus, how to disable Bluetooth and how to secure Bluetooth devices in the enterprise. Continue Reading
-
May 04, 2005
04
May'05
How to identify and monitor network ports after intrusion detection
What should your next step be after finding an unfamiliar source or destination port on an IDS alert or firewall log? JP Vossen takes you through the process of port analysis. Continue Reading
-
May 04, 2005
04
May'05
Adware, rootkits and worms: Translating malware speak
Learn basic translations for common malware terms, including adware, rootkits and worms. Continue Reading
-
May 03, 2005
03
May'05
XML viruses threaten Web services security
XML security vendors are shoring up their products to protect Web services against viruses, worms and malware. Continue Reading
-
May 03, 2005
03
May'05
Report: IT shops lax about logging
New research suggests enterprises are taking a half-baked approach to log management, compromising security in the process. Continue Reading
-
May 02, 2005
02
May'05
Keeping on top of risk management and data integrity essentials
Risk management is vital for all enterprises, but for an oil company like ChevronTexaco and its Chief Information Protection Officer, Richard Jackson, the consequences of a risky drill site can last for decades. Also in this issue, read features on ... Continue Reading
-
May 02, 2005
02
May'05
Demise of public-private partnerships
Government officials need to lend a helping hand to keep public-private partnerships on the straight and narrow -- and available to all in the industry. Continue Reading