2002 Security Articles
The Health Information Portability and Accountability Act is designed to protect personal medical information that is stored electronically. Julia Greenfield fills you in.
November 29, 2002
Vendor Analysis: Kaspersky Anti-Virus Products
Kaspersky Labs is no newcomer to anti-virus products. Though many IT decision makers neglect to protect their UNIX systems from viruses, Kaspersky's research indicates that Linux viruses are growing.
November 18, 2002
Anti-virus software should be the first line of defense in preventing miscreants from destroying the integrity of your data with viruses, Trojans, and worms. Julia Greenfield gives you the basics.
October 29, 2002
You've Been Hacked. Now What?
Laura Taylor tells you how to solve hacking problems using forensics tools in the October '02 issue of e-Business magazine. (Subscription required.)
October 1, 2002
Security Scanning 101
One of the most important steps in securing your intranet is determining the vulnerabilities. Laura Taylor tells you how.
September 23, 2002
WEP Will Not Solve All Your Wireless Security Problems, But it Is Still a First Line of Defense
WEP will help improve the security of your wireless network. Using Cisco products, Laura Taylor tells you how. (Guest login required.)
August 27, 2002
Intrusion Detection is not Intrusion Prevention
Time to clear up a common misconception about intrusion detection. Laura Taylor explains how intrusion detection systems differ from intrusion prevention systems.
August 20, 2002
Secure FTP 101
Using FTP securely is becoming more important than ever before. Laura Taylor tells you how.
August 14, 2002
VPN Shopping 101
Are you in the market for a VPN? Here are some factors you should consider, and some questions you should ask your vendor.
July 26, 2002
Setup a StoneGate Firewall/VPN on Your Existing Network
Stonesoft was one of the first vendors to come out with an HA solution for firewalls and VPNs. Here's how to set one up.
July 23, 2002
Old-School UNIX Tools Help Track Down Hackers
Old-school UNIX commands can be used to perform a variety of security incident response forensics. Laura Taylor brings you up to speed on this process. (Guest login required.)
July 19, 2002
Security Scanning is not Risk Analysis
Many IT decision makers assume that using a network scanner is the same thing as performing risk analysis. Laura Taylor explains how these two processes differ.
July 14, 2002
OKENA brews up a StormSystem that Secures all Applications
OKENA's announcement of their product line StormSystem indicates that they intend to grow and expand their innovative intrusion prevention system with highly integrated new add-ons. (Guest login required.)
June 29, 2002
The Cisco Aironet PC350 Adds Extra Security to VPN Wireless Clients
As wireless networks become more popular, securing them requires added measures. Laura Taylor tells you how to shore up your wireless security with some easy to use Cisco products.
June 26, 2002
IPSec is the most widely used standard for implementing VPNs. Learn the basics on how IPSec secures data that travels across public networks.
June 13, 2002
IIS is inherently insecure. However, you can tighten it up yourself, without expensive add-on products. Brien Posey tells you how.
June 2, 2002
Understanding Single Sign-on
Learn how to reduce cost, minimize support calls, and at the same time simplify the administrative process of authentication and authorization through single sign-on.
May 28, 2002
Smart Cards From Scratch
Smart Cards have been used in Europe for years for identify verification. Though the U.S. has been slow to hop on the smart card bandwagon, the 9-11 terrorist attacks have raised new concerns regarding identify verification and identify fraud. Smart cards provide an effective and affordable means to provide identity verification for all applications, including those hosted on an intranet.
May 8, 2002
SecureWave Protects Microsoft Operating System Platforms
The traditional approach to network intrusion management is to detect an intrusion, analyze it, and then works toward eradicating it. By buckling down your host security, securing the input/output devices, and intercepting Trojan executables, SecureWave can prevent intrusions from happening up front.
March 2, 2002
Firewall Shopping 101
Shopping for an enterprise firewall can be intimidating if you've never done it before. However, with a little background knowledge, an understanding of firewall features, and knowing what questions to ask the vendors, you'll end up with just the right firewall for your organization.
February 13, 2002
Security Incident Response Planning and Management
Security incident response is the resulting processes and actions an organization takes in responding to a security intrusion. Any company or organization that does business using the Internet, or private wide-area communications networks, should have a security incident response program setup before a security incident occurs.
January 28, 2002
Vendor Analysis: Interliant's Security Vulnerability Assessment Service
A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security vulnerability assessment service.
January 14, 2002
InsideOut Makes Firewall Reporting Useful
Reading firewall logs on a daily basis is key to protecting your intranet and internal network. Unfortunately, firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention. Learn how InsideOut firewall reporting not only gives you firewall logs, but ones that are easy to comprehend.
January 9, 2002
|Copyright 1997-2023 Relevant Technologies. All rights reserved | Legal and Privacy | Sitemap
Email: firstname.lastname@example.org | 8115 Maple Lawn Blvd, Suite 350, Fulton, MD 20759