|
2002 Security Articles HIPAA 101 The Health Information Portability and Accountability Act is designed to protect personal medical information that is stored electronically. Julia Greenfield fills you in. November 29, 2002 Vendor Analysis: Kaspersky Anti-Virus Products Kaspersky Labs is no newcomer to anti-virus products. Though many IT decision makers neglect to protect their UNIX systems from viruses, Kaspersky's research indicates that Linux viruses are growing. November 18, 2002 Anti-Virus 101 Anti-virus software should be the first line of defense in preventing miscreants from destroying the integrity of your data with viruses, Trojans, and worms. Julia Greenfield gives you the basics. October 29, 2002 You've Been Hacked. Now What? Laura Taylor tells you how to solve hacking problems using forensics tools in the October '02 issue of e-Business magazine. (Subscription required.) October 1, 2002 Security Scanning 101 One of the most important steps in securing your intranet is determining the vulnerabilities. Laura Taylor tells you how. September 23, 2002 WEP Will Not Solve All Your Wireless Security Problems, But it Is Still a First Line of Defense WEP will help improve the security of your wireless network. Using Cisco products, Laura Taylor tells you how. (Guest login required.) August 27, 2002 Intrusion Detection is not Intrusion Prevention Time to clear up a common misconception about intrusion detection. Laura Taylor explains how intrusion detection systems differ from intrusion prevention systems. August 20, 2002 Secure FTP 101 Using FTP securely is becoming more important than ever before. Laura Taylor tells you how. August 14, 2002 VPN Shopping 101 Are you in the market for a VPN? Here are some factors you should consider, and some questions you should ask your vendor. July 26, 2002 Setup a StoneGate Firewall/VPN on Your Existing Network Stonesoft was one of the first vendors to come out with an HA solution for firewalls and VPNs. Here's how to set one up. July 23, 2002 Old-School UNIX Tools Help Track Down Hackers Old-school UNIX commands can be used to perform a variety of security incident response forensics. Laura Taylor brings you up to speed on this process. (Guest login required.) July 19, 2002 Security Scanning is not Risk Analysis Many IT decision makers assume that using a network scanner is the same thing as performing risk analysis. Laura Taylor explains how these two processes differ. July 14, 2002 OKENA brews up a StormSystem that Secures all Applications OKENA's announcement of their product line StormSystem indicates that they intend to grow and expand their innovative intrusion prevention system with highly integrated new add-ons. (Guest login required.) June 29, 2002 The Cisco Aironet PC350 Adds Extra Security to VPN Wireless Clients As wireless networks become more popular, securing them requires added measures. Laura Taylor tells you how to shore up your wireless security with some easy to use Cisco products. June 26, 2002 Understanding IPSec IPSec is the most widely used standard for implementing VPNs. Learn the basics on how IPSec secures data that travels across public networks. June 13, 2002 Tightening IIS IIS is inherently insecure. However, you can tighten it up yourself, without expensive add-on products. Brien Posey tells you how. June 2, 2002 Understanding Single Sign-on Learn how to reduce cost, minimize support calls, and at the same time simplify the administrative process of authentication and authorization through single sign-on. May 28, 2002 Smart Cards From Scratch Smart Cards have been used in Europe for years for identify verification. Though the U.S. has been slow to hop on the smart card bandwagon, the 9-11 terrorist attacks have raised new concerns regarding identify verification and identify fraud. Smart cards provide an effective and affordable means to provide identity verification for all applications, including those hosted on an intranet. May 8, 2002 SecureWave Protects Microsoft Operating System Platforms The traditional approach to network intrusion management is to detect an intrusion, analyze it, and then works toward eradicating it. By buckling down your host security, securing the input/output devices, and intercepting Trojan executables, SecureWave can prevent intrusions from happening up front. March 2, 2002 Firewall Shopping 101 Shopping for an enterprise firewall can be intimidating if you've never done it before. However, with a little background knowledge, an understanding of firewall features, and knowing what questions to ask the vendors, you'll end up with just the right firewall for your organization. February 13, 2002 Security Incident Response Planning and Management Security incident response is the resulting processes and actions an organization takes in responding to a security intrusion. Any company or organization that does business using the Internet, or private wide-area communications networks, should have a security incident response program setup before a security incident occurs. January 28, 2002 Vendor Analysis: Interliant's Security Vulnerability Assessment Service A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security vulnerability assessment service. January 14, 2002 InsideOut Makes Firewall Reporting Useful Reading firewall logs on a daily basis is key to protecting your intranet and internal network. Unfortunately, firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention. Learn how InsideOut firewall reporting not only gives you firewall logs, but ones that are easy to comprehend. January 9, 2002 |
Copyright 1997-2023 Relevant Technologies. All rights reserved | Legal and Privacy | Sitemap Email: info@relevanttechnologies.com | 8115 Maple Lawn Blvd, Suite 350, Fulton, MD 20759 |