Secure Remote Access
- January 20, 2017
SSH creator Tatu Ylonen talks with SearchSecurity about how the cryptographic network protocol has grown over the years and why poor SSH security is jeopardizing enterprises today.
- January 13, 2015
The most important of the seven fixes for the WebEx Meeting Server platform remedies a flaw that could allow a cross-site request forgery attack.
- October 24, 2014
- March 30, 2012
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore.
- February 13, 2012
Attackers are finding an easy way into corporate networks often by targeting remote management weaknesses. Poorly configured software can lead to a data security breach.
- December 06, 2010
AVG, McAfee and Microsoft Corp. will work with the ISCA Labs to test and certify integrated endpoint security components.
- October 23, 2008
Cisco Systems warned customers Wednesday that its Adaptive Security and PIX Security appliances contained flaws affecting the security of VoIP and VPN connections.
- February 20, 2008
IT pros still have an interest in NAC technology. But as Neil Roiter explains, the cost and complexity of NAC means the road to adoption will not be quick.
- December 05, 2007
Cisco Systems Inc. is adding role-based access control into its switches to carry role information to every enforcement point in the network.
- September 06, 2007
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.
- May 21, 2007
Users hail the new compatibility of Microsoft NAP and the Trusted Computing Group's TNC architecture. But they say it won't speed up their adoption timetables.
- March 14, 2007
Gary McGraw, chief technology officer of Dulles, Va.-based security firm Cigital Inc., is a security luminary with several books to his credit, including "Software Security: Building Security In," "Java Security" and "Exploiting Software." His ...
- August 10, 2006
Black Hat: Network access control systems are widely used by enterprises to remediate client access to internal networks, but experts say many NAC systems can be easily bypassed.
- June 12, 2006
IT pros say organizations have put too much faith in firewalls at the expense of other needed security programs, but they're still a key part of a layered defense.
- March 16, 2006
Candy-maker Jelly Belly's network was so secure even top executives couldn't get in through the VPN. The company solved the sticky situation with innovative new appliances.