Secure Remote Access
- September 04, 2019
Security researchers discovered BMC vulnerabilities -- dubbed USBAnywhere -- in Supermicro servers that could put systems at risk of remote attacks via virtualized USB drives.
- January 20, 2017
SSH creator Tatu Ylonen talks with SearchSecurity about how the cryptographic network protocol has grown over the years and why poor SSH security is jeopardizing enterprises today.
- January 13, 2015
The most important of the seven fixes for the WebEx Meeting Server platform remedies a flaw that could allow a cross-site request forgery attack.
- October 24, 2014
- March 30, 2012
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore.
- February 13, 2012
Attackers are finding an easy way into corporate networks often by targeting remote management weaknesses. Poorly configured software can lead to a data security breach.
- February 20, 2008
IT pros still have an interest in NAC technology. But as Neil Roiter explains, the cost and complexity of NAC means the road to adoption will not be quick.
- December 05, 2007
Cisco Systems Inc. is adding role-based access control into its switches to carry role information to every enforcement point in the network.
- September 06, 2007
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.
- March 14, 2007
Gary McGraw, chief technology officer of Dulles, Va.-based security firm Cigital Inc., is a security luminary with several books to his credit, including "Software Security: Building Security In," "Java Security" and "Exploiting Software." His ...
- August 10, 2006
Black Hat: Network access control systems are widely used by enterprises to remediate client access to internal networks, but experts say many NAC systems can be easily bypassed.
- December 02, 2005
Its Access Essentials were developed specifically for the smaller companies that hadn't been able to afford the server setup.
- October 23, 2001
SearchSecurity network and management expert Steve Mencik offers advice for securing remote workers in this question-and-answer interview.
- October 23, 2001
Paul Strassmann contends that the best approach to securing remote workforce access to corporate information is by means of -- what in intelligence operations is called -- "compartmentalization."