Network access control

  • Unintentionally, AMD, Intel Build Great Cloud Chips

    Posted October 18, 2010 - 11:12 am

    It's not what they aimed at when adding GPUs to multicores, but next-gen processors should make virtual desktops, clouds and other forms of virtualization much easier on highly portable hardware.
  • Microsoft RegEx Fuzzer Frisks Code for DDOS Risks

    Posted October 14, 2010 - 7:53 am

    Microsoft's new app-dev tool sifts through application code to highlight common expressions or functions that could bog down a system if attackers hit them with the right bogus requests.
  • Microsoft to Prosecute More Botnets

    Posted October 13, 2010 - 12:30 pm

    Just so you know Microsoft won't have to resort to arcane technical solutions to the botnet problem -- the way Facebook did by using obviously
  • FBI Busts Fake Spy at Akamai

    Posted October 12, 2010 - 6:01 pm

    A well placed saboteur or spy could do some damage inside the companies that keep the Internet's secured traffic moving; the FBI spent 18 months investigating a guy they say gave copies of customer receipts to a "foreign country."
  • Win7 Smartphones Will Increase Pressure on IT

    Posted October 11, 2010 - 7:16 pm

    Microsoft is far from the leader in smartphone OSes, but putting Win7 in users' pockets makes it almost impossible to keep it or iPhones or Androids out of the data center.
  • Microsoft Wants the Easy Way Out of Botnets

    Posted October 8, 2010 - 12:01 pm

    Enforcing antivirus within the network and at the endpoints is better than isolating plague victims until they're all dead.
  • Why Stuxnet Matters

    Posted October 7, 2010 - 11:36 am

    By attacking real infrastructure, not commercial sites, Stuxnet crossed the line between hacking for dollars and digital warfare.
  • Is Videoconferencing the Next Big Threat to Your Job?

    Posted October 6, 2010 - 1:18 pm

    Citrix Systems' new HD video is just one more bandwidth-sucking app to the hogs already clogging up your net. If you try to resist, they'll eat you.
  • NAC decisions you need to make now

    Posted July 27, 2010 - 11:47 am

    One important piece of a multilevel security defense for companies of almost any size is network access control (NAC), which lets you enforce policies for end-user machines.
  • Five reasons Google Chrome OS Security Wins

    Posted November 24, 2009 - 3:33 pm

    Chrome OS' reliance on a password is a major security problem, but in other ways it has great security. Here's why.
  • Where Google Chrome security fails: the password

    Posted November 23, 2009 - 12:42 pm

    Google promises that Chrome will be a much more secure than Windows. Well, yes, but it also has one big problem as well.
  • How 9-11 Shaped Hoover Dam Security Operations

    Posted October 26, 2009 - 12:40 pm

    The Hoover Dam is one of the great wonders of American engineering and in addition it is an important part of our nation's critical infrastructure. Here's a look at how the Bureau of Reclamation, a part of the U.S. Department of Interior, protects this national icon.
  • Don't Forget DHCP

    Posted October 22, 2009 - 11:17 am

    When it comes to managing IP addresses, few of us would forget to track the IPs we assign manually to our WAN interfaces, servers, switches, and etc. However, once we decide to assign a DHCP scope to a subnet we tend to "set it and forget it". In many cases, this is a big mistake.
  • Engineering Judgment III: Account Management

    Posted September 20, 2009 - 2:43 pm

    A non-traditional approach to account management
  • Data Debauchery That Happens in Vegas Doesn't Stay There

    Posted September 15, 2009 - 8:56 pm

    Organizations love to collect data on people, often in the name of identity and access control. But more often than not, the information gathering fails to improve security. In fact, it often makes matters worse.
  • Access control vendors unite to tackle Linux, Unix and Windows

    Posted September 14, 2009 - 9:36 am

    Symark International Monday is announcing the acquisition of BeyondTrust for approximately $20 million in a deal that brings together two privately-held access control product vendors. Under the deal, Symark is adopting the BeyondTrust name.
  • Relaying Mail from Subdomains

    Posted September 8, 2009 - 3:06 pm

    Relaying mail doesn't only come into play when someone is trying to use your mail server to deliver mail to a third domain. It can also affect your own subdomains.
  • Serial numbers in zone files: Yours and named's

    Posted July 27, 2009 - 5:55 pm

    Serial numbers in zone files help your DNS service determine when it should re-ingest your zone files or ignore them. But there's more to these pseudo timestamps than meets the eye. In fact, the number that you put in your file and the one that DNS extracts from it might be as different as 200907270001 and 3338774385.
  • It's the Information, Stupid

    Posted June 8, 2009 - 10:08 am

    The people in an organization are closest to the critical data, so when it comes to data leakage they can be security's best friend or its worst enemy.
  • Review

    Microsoft NAP: NAC for the rest of us?

    Posted May 14, 2009 - 4:53 pm

    Microsoft NAP is an effective network gatekeeper for Windows endpoints, but initial configuration is complex, policies are basic, and reporting is absent.
  • When NAC meets NAP

    Posted May 14, 2009 - 9:59 am

    Complete and seamless integration across Cisco NAC, Microsoft NAP, and other network access control solutions remains a distant dream, but signs of progress emerge.
  • NAC software eases access rights assignments

    Posted May 2, 2009 - 8:40 pm

    Avenda Systems is announcing support for MAC OS X devices in its NAC gear that makes it possible to run MAC health checks as part of a Microsoft network access protection (NAP) deployment.
  • Sftp-Only User Accounts

    Posted April 22, 2009 - 1:35 pm

    Need to support users who only need to upload and/or download files to your server? Set them up with an sftp-only account.
  • ForeScout doubles NAC management reach

    Posted April 15, 2009 - 10:26 am

    A software upgrade for ForeScout's CounterACT NAC platform will enable it to manage 400,000 endpoints, double the number of previous software releases.
  • Review

    Book Review: Cisco Routers for the Desperate, 2nd Edition

    Posted March 18, 2009 - 3:35 pm

    If you're a Unix systems administrator who every now and then has to tend to Cisco routers and switches, here's a book that's going to relieve your stress level. Cisco Routers for the Desperate is just that -- nearly everything you need to know when you don't have time to read the tomes of Cisco documentation.
Join us:






Join today!

See more content
Ask a Question