By Joe Stanganelli | Oct 31, 2013
The Internet of Things comes with a security downside that can't be ignored.
By Joe Stanganelli | Oct 21, 2013
Has the NSA built a backdoor into your enterprise's networking stack? Learn the dangers and how to protect your enterprise's sensitive data.
By Jude Chao | Oct 18, 2013
Co-founder of Security-as-a-Service provider Alert Logic explains what security vendors must provide for effective deployment in virtualized and cloud environments.
By Paul Rubens | Sep 30, 2013
A variety of threats—including NSA surveillance—endanger SSL security today. Learn how to mitigate the risks and protect your sessions' privacy, now and for the foreseeable future.
By Jude Chao | Sep 25, 2013
Secure Shell protocol inventor warns that uncontrolled SSH credentials could cause major security incidents, gives best practices for mitigating the risks.
By Jude Chao | Sep 18, 2013
The increased complexity of IPv6 deployments and other next-gen network issues demands automation and orchestration. Here's why.
By Elizabeth Harrin | Mar 5, 2012
Virtualization solves many problems at the server and application layer but it does open up holes in the network that must be secured.
By Paul Rubens | Jul 25, 2011
Does your SSL server have misconfigurations and known vulnerabilities that make it insecure? Follow these ten tips to avoid common SSL security mistakes.
By Sue Poremba | Feb 4, 2011
Moving to a VPN appears to be a move more companies are making as computing becomes more mobile and access to sensitive data is a growing concern.
By Paul Rubens | Jan 14, 2011
Cross-site request forgery attacks can devastate your business and compromise your organizational security. Learn five ways to limit your exposure.
By Eric Geier | Jan 7, 2011
If you're having problems with 802.1X authentication on your WLAN, our troubleshooting guide might save you some hair-pulling.
By Eric Geier | Dec 9, 2010
WPA2 Enterprise encryption with 802.1X authentication provides the best Wi-Fi security for businesses, but it's not always easy to configure. Our guide will get you past some of the stumbling blocks.
By Paul Rubens | Nov 1, 2010
XSS vulnerabilities often target users but offer a way for malicious users to turn around and crack sites. Here's how they work and how to stop them.
By Eric Geier | Oct 15, 2010
SU1X provides a simple 802.1X configuration wizard network administrators can distribute to end users, cutting down on frustrating configuration errors and speeding deployment.
By Kara Reeder | Oct 11, 2010
When it comes to authentication, security experts agree that passwords just aren't enough.
By Sue Poremba | Aug 5, 2010
By Sue Poremba | Jun 16, 2010
It's ultimately your data, and you can't always count on an SLA to keep it safe and available.
By Sue Poremba | Jun 16, 2010
Internal development teams have worked with "For Internal Use Only� in mind. And then came the cloud.
By Mike Vizard | Jun 16, 2010
It's not quite a commodity just yet.
By Lisa Phifer | Jun 14, 2010
SQL injection and cross-site scripting lead a list of the most worrisome Web application security risks as reported by the Open Web Application Security Project.
By Paul Rubens | Jun 1, 2010
While your network security team spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?
By Eric Geier | May 5, 2010
If your operating system's native 802.1X client doesn't work with your gear, or if you need additional features, you've got a few choices for your Windows, Linux or Mac clients.
By Sue Poremba | Apr 29, 2010
Ever wonder what steps the people who work in the IT security industry take to protect their computer networks?
By Jim Freeze | Mar 17, 2010
You can't start an IT conversation these days without someone bringing up the word virtualization. That magic word promises higher resource utilization, cost reduction, improvements in operational uptime and business continuity, and improved carbon footprint, to name a few.
By Ken Paul | Mar 16, 2010
Data loss is a major concern for businesses of all sizes. High profile data breaches continue to grab headlines and organisations are feeling the heat of the intense media spotlight for losing confidential information about their company, employees, and clients.
By Paul Rubens | Feb 23, 2010
SQL injection attacks could allow hackers to compromise your network, access and destroy your data, and take control of your machines.
By David Ting | Jan 26, 2010
Technology has evolved to address the challenges of the modern business market. Mobile working and round-the-clock communication have tested information security, as has the need to lock down data from the inside-out.
By Stephane Fymat | Jan 19, 2010
One only has to consider the case of Jerome Kerviel, the rogue trader at French bank Societe Generale, who used multiple shared passwords and accounts to execute fraudulent trades, to appreciate the risks shared account logons pose to the modern organisation.
By Sacha Chahrvin | Jan 19, 2010
Cloud Computing has a long way to go before it takes over the market — not in terms of technology, but in terms of how it is perceived by potential clients. For the majority of them, Cloud Computing seems like an interesting — but not very secure — idea.
By Sacha Chahrvin | Jan 14, 2010
The risk-based approach to information security that has dominated the corporate market in recent years has resulted in the IT security industry moving from a network-centric to a data-centric information security model.
By Sue Poremba | Dec 29, 2009
By Victor Herring | Nov 24, 2009
Whether deploying strong authentication, implementing an enterprise-wide identity management initiative or simply focusing on the sign-on challenges of end users, it is essential for organizations
By Christopher Burgess | Nov 19, 2009
End users tuning you out? Here's a three-step process for taking human factors into account in your security program (and even using them to your advantage).
By Charlie Schluting | Oct 28, 2009
You might be ready to move beyond OpenVPN, but feel daunted by IPSEC's learning curve. With our quick guide, you'll be up and running with free, open Openswan in no time.
By Paul Rubens | Sep 21, 2009
The problem with user-hostile password policies and the associated feats of memorization involved is how poorly they address every other threat to your network besides dictionary attacks.
By Paul Rubens | Sep 15, 2009
Formulating password policy is a balancing act - a trade-off between usability and security
By Paul Rubens | Mar 4, 2009
You don't have to break the bank to provide members of your mobile workforce with more security while they're on the go. Here are ten low-cost ways to harden laptops on a shoestring.
By Paul Rubens | Feb 20, 2009
With more and more mobile workers accessing your network from outside the perimeter it's time to consider Firefox and these seven add-ons to keep them safe and improve your network security.
By Paul Rubens | Feb 11, 2009
We'll get you past the daunting configuration issues so you can use OpenVPN to provide no-cost, secure networking for your Windows, Mac or Unix/Linux systems.
By Paul Rubens | Jan 28, 2009
Part One: OpenVPN provides open source, on-the-go security for users on Windows, Mac and Linux/Unix.
By Deann Corum | Nov 25, 2008
Best of ENP: If you're running Windows DNS on your network, here's what you need to know to secure it against some common threats. Grab the aspirin and pull up a seat.
By Carla Schroder | Jan 29, 2008
Best of ENP: Wireless security is still a bit of a mess. With Linux and RADIUS, you can begin to straighten it out.
By Carla Schroder | Sep 18, 2007
Best of ENP: With OpenSSH you can ensure that the bits flowing over your network are wrapped in strong encryption. With Keychain, you can make managing OpenSSH's public/private key crypto a little less of a hassle. Our practically ultimate howto shows you how.
By Deann Corum | Sep 29, 2005
Microsoft's IIS and SQL Server can provide tempting targets for malicious people. Our security checklist will help you lower your risk of attack.
By Charlie Schluting | Jul 29, 2005
How do you patch a machine too badly infected to allow on your network? Here are two approaches.
By Charlie Schluting | Jul 14, 2005
Executive Briefing: Faced with a massive DDoS attack, what are your options? Not many as it turns out, but it helps to have friends upstream.
By Charlie Schluting | Jun 9, 2005
Even if you've tuned your spam-fighting arsenal to perfection, you've still got a big problem. Namely, what do you do with all that undeliverable spam? Here are a few ideas.
By Charlie Schluting | Apr 28, 2005
Executive Overview: With a wave of the wand, your network team has installed a VPN. While that solved some access issues for your remote users, it also created some new security problems.
By Charlie Schluting | Apr 8, 2005
With phishing and pharming attacks on the rise, protecting your DNS servers from cache poisoning is more important than ever.
By Charlie Schluting | Apr 1, 2005
Securing DNS: DNSSEC is no silver bullet for your DNS security concerns, but it can solve a few potential problems, and that's better than nothing.
By Drew Bird | Mar 29, 2005
Part One: Many security-minded admins scoff at passwords as tissue-thin protection against malicious users. But with Windows 2003 Server's password policy tools, you can do a lot to tighten down your most basic line of defense.
By Charlie Schluting | Mar 10, 2005
Executive Overview: Your network engineers will always have plenty of suggestions for how to secure the border. Here's a summary that will help you balance productivity with security.
By Carla Schroder | Feb 17, 2005
Why worry about WEP, WPA, or PPTP when OpenVPN provides free, open, SSL-powered security for your wireless network? Here's how to set it up and connect a Windows client.
By Charlie Schluting | Jan 20, 2005
Cisco's Catalyst Intelligent features can help you lower the boom on rogue DHCP servers, ARP poisoning, and other network perils. We show you how, step by step.
By Enterprise Networking Planet Staff | Sep 20, 2011
Arp cache poisoning puts the attacker in position to intercept communications between the two computers.
By Drew Bird | Dec 17, 2004
Software Restriction Policies, Part Two: Last week we introduced you to the software restriction policies features in Windows Server 2003. This week we go in-depth to show you how to create your own SR policies to secure your systems against worms and malware.
By Enterprise Networking Planet Staff | Sep 8, 2011
Best practices for Microsoft Internet Security and Acceleration (ISA) Server.
By Enterprise Networking Planet Staff | Aug 24, 2011
Enterprise security requires careful monitoring of server logs.
By Enterprise Networking Planet Staff | Aug 16, 2011
Compromised passwords are often used to commit attacks ranging from phishing to larger network breaches.
By Enterprise Networking Planet Staff | Aug 1, 2011
Prevent network data and privacy breaches with these 10 best practices tips.
By Jabez Gan | Jul 18, 2011
Need to keep nonmanaged devices from connecting to your wired network? Teaming Active Directory with a RADIUS server will do the job, adding 802.1X authentication with minimal configuration.
By Enterprise Networking Planet Staff | Jul 6, 2011
Tips on surviving sophisticated malware infections.
By Brian Proffitt | Feb 3, 2011
Network managers have a whole new attack surface to manage: the vast multitude of potential entry points created by social media sites, each one offering new opportunities for malware or information loss.
By Paul Rubens | May 18, 2010
Insiders -- the people who already have access to your network -- can do a lot more damage than a hacker who's still outside the firewall. Learn ways to minimize your risk from the insider threat.
By Paul Rubens | Jan 6, 2010
Automated penetration testing tools are a two edged sword: Learn how to run Metasploit-based Fast-Track on your own network before the black hats do.
By Paul Rubens | Dec 27, 2007
Rogue access points, weak passwords and poor security standards plague every network administrator. Aircrack-ng can help you sniff out these problems and take care of them, before your network gets taken care of by someone less benign.
By Carla Schroder | Jun 16, 2004
You may be an old-school holdout, or you may have inherited a network with NFS/NIS driving some of the file-sharing load. Either way, here's how you can button down these venerable threats to network security.