Secure Your Infrastructure

The cloud and BYOD make securing your infrastructure ever more crucial to protecting your data and your bottom line. Attacks on enterprise networks can cost millions of dollars to organizations every year, according to a 2012 Ponenon Institute study. Don't let your network be the next to fall. In our collection of network infrastructure security guides and best practices, Enterprise Networking Planet experts discuss to how protect sensitive data and infrastructure integrity by securing your SSL, making sure your VPN fits into your security plan, and implementing enterprise-level encryption and authentication technologies and strategies, as well as much more. Start here to secure your network infrastructure and protect your organization's information and interests.

They Want Your Enterprise Brains: Night of the Botnet of Things

The Internet of Things comes with a security downside that can't be ignored.

Protect Against NSA Backdoors in Networking Gear

Has the NSA built a backdoor into your enterprise's networking stack? Learn the dangers and how to protect your enterprise's sensitive data.

The Challenges of Cloud Security Deployments

Co-founder of Security-as-a-Service provider Alert Logic explains what security vendors must provide for effective deployment in virtualized and cloud environments.

Secure SSL Against Today's Threats

A variety of threats—including NSA surveillance—endanger SSL security today. Learn how to mitigate the risks and protect your sessions' privacy, now and for the foreseeable future.

Lax SSH Key Management Endangers Enterprise Networks

Secure Shell protocol inventor warns that uncontrolled SSH credentials could cause major security incidents, gives best practices for mitigating the risks.

IPv6 Security Demands Automation

The increased complexity of IPv6 deployments and other next-gen network issues demands automation and orchestration. Here's why.

Pulling Your Private Cloud out of the Shadows

Virtualization solves many problems at the server and application layer but it does open up holes in the network that must be secured.

Ten Tips to Make Your SSL Secure

Does your SSL server have misconfigurations and known vulnerabilities that make it insecure? Follow these ten tips to avoid common SSL security mistakes.

Fitting VPN into a Security Plan

Moving to a VPN appears to be a move more companies are making as computing becomes more mobile and access to sensitive data is a growing concern.

Five Ways to Reduce Your Vulnerability to CSRF Attacks

Cross-site request forgery attacks can devastate your business and compromise your organizational security. Learn five ways to limit your exposure.

Troubleshooting Checklist for 802.1X on Your WLAN

If you're having problems with 802.1X authentication on your WLAN, our troubleshooting guide might save you some hair-pulling.

Implement WPA2 Enterprise Encryption on Your WLAN

WPA2 Enterprise encryption with 802.1X authentication provides the best Wi-Fi security for businesses, but it's not always easy to configure. Our guide will get you past some of the stumbling blocks.

Understanding (and Stopping) Cross-Site Scripting Vulnerabilities

XSS vulnerabilities often target users but offer a way for malicious users to turn around and crack sites. Here's how they work and how to stop them.

Ease 802.1X Deployments With the SU1X Configuration Tool

SU1X provides a simple 802.1X configuration wizard network administrators can distribute to end users, cutting down on frustrating configuration errors and speeding deployment.

Creating a Secure Authentication Strategy

When it comes to authentication, security experts agree that passwords just aren't enough.

Five Top Risks to Mobile Devices and How to Protect Them

I've written many times about how the mobile office increases security r

Six Questions to Ask Before Joining the Cloud

It's ultimately your data, and you can't always count on an SLA to keep it safe and available.

Top 5 Security Concerns for Applications in Cloud Computing

Internal development teams have worked with "For Internal Use Only� in mind. And then came the cloud.

Ask These 10 Questions to Find Out if Your Cloud Provider Is Enterprise-Ready

It's not quite a commodity just yet.

SQL Injection and XSS Top Web App Security List

SQL injection and cross-site scripting lead a list of the most worrisome Web application security risks as reported by the Open Web Application Security Project.

Web Application Security: Are You Doing Enough?

While your network security team spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?

Using Third-Party 802.1X Clients on Windows, Linux or Mac

If your operating system's native 802.1X client doesn't work with your gear, or if you need additional features, you've got a few choices for your Windows, Linux or Mac clients.

9 Tips from Security Experts

 Ever wonder what steps the people who work in the IT security industry take to protect their computer networks?

Understanding the Two Types of Security Virtualization

You can't start an IT conversation these days without someone bringing up the word virtualization. That magic word promises higher resource utilization, cost reduction, improvements in operational uptime and business continuity, and improved carbon footprint, to name a few.

Guide to Security of Software and Systems in the Workplace

Data loss is a major concern for businesses of all sizes. High profile data breaches continue to grab headlines and organisations are feeling the heat of the intense media spotlight for losing confidential information about their company, employees, and clients.

10 Ways to Prevent or Mitigate SQL Injection Attacks

SQL injection attacks could allow hackers to compromise your network, access and destroy your data, and take control of your machines.

Access Management: How to Authenticate Users

Technology has evolved to address the challenges of the modern business market. Mobile working and round-the-clock communication have tested information security, as has the need to lock down data from the inside-out.

Privileged and Shared Accounts – Why You Must Close this Security Hole

One only has to consider the case of Jerome Kerviel, the rogue trader at French bank Societe Generale, who used multiple shared passwords and accounts to execute fraudulent trades, to appreciate the risks shared account logons pose to the modern organisation.

Making Clouds Secure

Cloud Computing has a long way to go before it takes over the market — not in terms of technology, but in terms of how it is perceived by potential clients. For the majority of them, Cloud Computing seems like an interesting — but not very secure — idea.

The Fusion of Context & Content Awareness – Making Endpoint DLP Effective

The risk-based approach to information security that has dominated the corporate market in recent years has resulted in the IT security industry moving from a network-centric to a data-centric information security model.

How to Recover from a Failed Security Audit

Selecting the Best Biometric Technology to Integrate with Enterprise Single Sign-On Solutions

Whether deploying strong authentication, implementing an enterprise-wide identity management initiative or simply focusing on the sign-on challenges of end users, it is essential for organizations

Effective Security Policy Messaging Important

End users tuning you out? Here's a three-step process for taking human factors into account in your security program (and even using them to your advantage).

Build an IPSEC VPN Without Losing Your Mind

You might be ready to move beyond OpenVPN, but feel daunted by IPSEC's learning curve. With our quick guide, you'll be up and running with free, open Openswan in no time.

Does Size Matter? Picking a Sane Password Policy

The problem with user-hostile password policies and the associated feats of memorization involved is how poorly they address every other threat to your network besides dictionary attacks.

Strike the Right Balance with Your Password Policy

Formulating password policy is a balancing act - a trade-off between usability and security

Secure Your Mobile Workers for Less

You don't have to break the bank to provide members of your mobile workforce with more security while they're on the go. Here are ten low-cost ways to harden laptops on a shoestring.

Secure Firefox With Seven Key Add-Ons

With more and more mobile workers accessing your network from outside the perimeter it's time to consider Firefox and these seven add-ons to keep them safe and improve your network security.

Run OpenVPN on Windows, Mac and Linux/Unix

We'll get you past the daunting configuration issues so you can use OpenVPN to provide no-cost, secure networking for your Windows, Mac or Unix/Linux systems.

OpenVPN Provides Security Wherever You Go

Part One: OpenVPN provides open source, on-the-go security for users on Windows, Mac and Linux/Unix.

Identify and Mitigate Windows DNS Threats

Best of ENP: If you're running Windows DNS on your network, here's what you need to know to secure it against some common threats. Grab the aspirin and pull up a seat.

FreeRADIUS and Linux Secure Your WLAN

Best of ENP: Wireless security is still a bit of a mess. With Linux and RADIUS, you can begin to straighten it out.

The (Practically) Ultimate OpenSSH/Keychain Howto

Best of ENP: With OpenSSH you can ensure that the bits flowing over your network are wrapped in strong encryption. With Keychain, you can make managing OpenSSH's public/private key crypto a little less of a hassle. Our practically ultimate howto shows you how.

Lock Down IIS and SQL Server

Microsoft's IIS and SQL Server can provide tempting targets for malicious people. Our security checklist will help you lower your risk of attack.

Infected Hosts? Put 'Em In Jail!

How do you patch a machine too badly infected to allow on your network? Here are two approaches.

DDoS Attacks: What Can You Do?

Executive Briefing: Faced with a massive DDoS attack, what are your options? Not many as it turns out, but it helps to have friends upstream.

Spam Fighting: To Bounce or Not to Bounce?

Even if you've tuned your spam-fighting arsenal to perfection, you've still got a big problem. Namely, what do you do with all that undeliverable spam? Here are a few ideas.

New VPN? Your Work Has Just Begun

Executive Overview: With a wave of the wand, your network team has installed a VPN. While that solved some access issues for your remote users, it also created some new security problems.

Harden BIND9 Against Cache Poisoning

With phishing and pharming attacks on the rise, protecting your DNS servers from cache poisoning is more important than ever.

DNSSEC: What Is It Good For?

Securing DNS: DNSSEC is no silver bullet for your DNS security concerns, but it can solve a few potential problems, and that's better than nothing.

Harden Your Windows Network with Strong Passwords

Part One: Many security-minded admins scoff at passwords as tissue-thin protection against malicious users. But with Windows 2003 Server's password policy tools, you can do a lot to tighten down your most basic line of defense.

Secure Your Perimeter and Play Nice on the 'Net

Executive Overview: Your network engineers will always have plenty of suggestions for how to secure the border. Here's a summary that will help you balance productivity with security.

OpenVPN Locks Down the WLAN

Why worry about WEP, WPA, or PPTP when OpenVPN provides free, open, SSL-powered security for your wireless network? Here's how to set it up and connect a Windows client.

Configure Your Catalyst for a More Secure Layer 2

Cisco's Catalyst Intelligent features can help you lower the boom on rogue DHCP servers, ARP poisoning, and other network perils. We show you how, step by step.

Network Security Tips: Arp Cache Poisoning

Arp cache poisoning puts the attacker in position to intercept communications between the two computers.

Battle Malware with Win2k3 Software Restriction Policies

Software Restriction Policies, Part Two: Last week we introduced you to the software restriction policies features in Windows Server 2003. This week we go in-depth to show you how to create your own SR policies to secure your systems against worms and malware.

Tips to Protect Your Network with Microsoft ISA Firewall Server

Best practices for Microsoft Internet Security and Acceleration (ISA) Server.

Network Security Tips: Server Log Management

Enterprise security requires careful monitoring of server logs.

Network Security Tips: Use Password Alternatives

Compromised passwords are often used to commit attacks ranging from phishing to larger network breaches.

Staying Secure Amidst Network Breaches

Prevent network data and privacy breaches with these 10 best practices tips.

Add Wired Authentication for RADIUS Servers

Need to keep nonmanaged devices from connecting to your wired network? Teaming Active Directory with a RADIUS server will do the job, adding 802.1X authentication with minimal configuration.

Minimizing the Effects of Malware on a Network

Tips on surviving sophisticated malware infections.

Managing Social Media for Network Security

Network managers have a whole new attack surface to manage: the vast multitude of potential entry points created by social media sites, each one offering new opportunities for malware or information loss.

Ten Ways to Protect Your Network From Insider Threats

Insiders -- the people who already have access to your network -- can do a lot more damage than a hacker who's still outside the firewall. Learn ways to minimize your risk from the insider threat.

Automate Your Pen Testing with Fast-Track and Linux

Automated penetration testing tools are a two edged sword: Learn how to run Metasploit-based Fast-Track on your own network before the black hats do.

Secure Your WLAN With Aircrack-ng

Rogue access points, weak passwords and poor security standards plague every network administrator. Aircrack-ng can help you sniff out these problems and take care of them, before your network gets taken care of by someone less benign.

NFS/NIS: Lessen Your Legacy Network Security Liabilities

You may be an old-school holdout, or you may have inherited a network with NFS/NIS driving some of the file-sharing load. Either way, here's how you can button down these venerable threats to network security.

Get the Latest Scoop with Networking Update Newsletter