Topics
Content Types
About 60 results
-
Strategies for real and virtual honeypots
You can avoid information overload from firewall and intrusion detection system reports by running a honeypot on your network.
-
SolutionBase: Securing information with Windows Rights Management Services
Learn how to secure data with Windows Rights Management Services.
-
The facts behind Microsoft's ASN.1 security vulnerability
Protect your operating system from this flaw in the ASN.1 library.
-
Tips for immediate patch management after a fresh install
Keeping a server patched and up-to-date is one of the most important tasks a network administrator has. Patching begins when you first install an OS. Here's what you have to do.
-
Network documentation must include a security operations guide
You should have documentation for everything on your network, including security. Creating a security operations guide allows you to document every element of your security policie...
-
Lock IT Down: Use eEye's SecureIIS to help lock down IIS systems
Use SecureIIS to block data blocked before it can be processed and the attempted security breach is logged.
-
Keeping software patches up to date with UpdateEXPERT
Traditional patch management is no longer feasible considering the dizzying array of patches you have to keep up with. This review of UpdateEXPERT takes a peek at one method guaran...
-
Manage your wireless network the easy way with AirWave
Wireless network management can be frustrating for your staffers if they spend countless hours reconfiguring access points. AirWave Management Platform can help by simplifying many...
-
A free tool that tracks down rogue access points
How Kismet can help secure your network
-
Firewall embedded NICs strengthen workstation defenses
See how to use special 3Com NICs with embedded firewalls to provide an extra layer of protection to workstations.