Network Security Journal

The Network Security Industry's Web Resource
  1. The tide has finally turned against spammers, with new tools, practices and attitudes slowly beginning to neutralize spam's impact. Or has it? Spammers also seem to be winning, burying enterprise...
  2. Security threats posed by IM (instant messaging), P2P (peer-to-peer) networking and other emerging communications modes are making firewall management a more important — and increasingly challen...
  3. As businesses struggle to secure their IT resources, many are tuning to NAC (Network Access Control) products. NAC tools are different from traditional security technologies and practices that focus o...
  4. Botnets! The mere thought of botnet-infected office computers stealing data, hosting fraudulent Web sites and participating in DoS (denial of service) attacks is enough to strike fear and loathing int...
  5. A disaster is never convenient, but a storm, a fire, an earthquake or another calamity can be particularly devastating when it strikes an unprepared business.       ...
  6. Everyone knows that malware is a pain in the backside, but many business owners and managers still don't fully understand that viruses, worms, Trojan horses and other bits of digital nastiness are...
  7. Do you believe that DoS (denial-of-service) attacks only strike Web sites operated by megabusinesses like Microsoft and Wal-Mart Stores Inc.? Think again. In its December 2007 report on the state of I...
  8. It's a situation that most businesses face: how to organize, distribute and monitor software-patch deployment without imperiling network-attached equipment.      &nbs...
  9. WHEN: January 24, 200810:00 AM PT / 1:00 PM ET WHAT: What are the challenges and benefits of implementing CRM for small-medium enterprise? How do you create a broader customer relationship? Is CR...
  10. Software patches, which offer product fixes, extra features, anti-malware capabilities and other add-ons, are a fact of life. But as software vendors strive to supply a steady stream of product enhanc...
  11. When: September 18, 2008  Where: New York Marriott Financial Center 85 West Street New York, N.Y. 10006  What: The annual IDC Security Summit brings together Security and IT executives...
  12. Constrained by limited IT budgets, businesses must shop carefully for strategic network technologies that will provide the biggest bang for the buck. But with all of the network-related products now a...
  13. You can learn a lot from a log file — at least once you figure out the meaning of all of the cryptic messages it contains.           Related Art...
  14. Search our catalog to find the right training course for you.
  15. What you don't know about incoming IP packets can hurt you, your network, your servers and your end users. That's because all packets aren't alike. Most packets are friendly and cause no w...
  16. Every network needs a security policy that provides both guidelines and guidance. But exactly what items should such a policy include?           Relat...
  17. Hackers are often painted negatively with a single, broad brushstroke. But there are bad hackers, "black hats" who write malware and do other evil things, and kinder, gentler "white hat...
  18. A report released late last year by the House Committee on Government Reform paints a frightening picture of the lackadaisical approach many government agencies and employees take toward sensitive dat...
  19. These comprehensive checklists on 9 different topics will improve your overall security posture, regardless of your current security prowess. We also provide links to the products that we recommend, a...
  20. Google wants to organize all of the world’s information. To do that it must access all that information. And to do that Google must convince everyone that its growing number of Google Apps are b...

VOSB Certification

Ponder This...

Are You Using Social Software?  Whether for you or your organization / business, social software is pioneering new and faster ways to collaborate, share information, and get assistance.  You need to be part of it.

Protected by Copyscape DMCA Takedown Notice Infringement Search Tool