Archive for the ‘Network security’ Category

Top 5 excellent Antivirus Protection of 2017

Excellence is achievable but perfection is not. Find an excellent anti-virus product based on your requirements.   Malware are evolving faster than ever, so it’s encourging to discover that the latest generation of antivirus (AV) are better equipped to handle this evolving pace of change. Information security best practice recommends that every PC should run […]

Leave a Comment

5 Essentials changes to harden Network Infrastructure

First principle to understand vulnerability assessment, one can’t exploit the vulnerability if a threat does not exist. So by default the services (ports) which are not required in a system (server) will present an unnecessary threat to be exploited if specific vulnerability exists in a system. These unnecessary and unattended services are also the prime […]

Comments (1)

Palo Alto Networks takes Firewalls to next Level

Ashlee Vance, Bloomberg Businessweek For the past 15 years or so, security pros have relied on the trusty firewall and other hardware to keep bad guys from running amok on corporate networks. For the most part, this has meant blocking tainted e-mails and keeping workers away from harmful websites. The latest wave of Web services, […]

Comments (5)

How IPSEC Stops the Three Most Common Attacks Against Your Network

Leave a Comment

How to configure your Linksys router for maximum security

Leave a Comment

Security and vulnerability assessments

Must have official EC-Council guide to security and vulnerability assessments! Network Defense: Security and Vulnerability Assessment (Ec-Council Press Series: Network Defense) This book will provide you with the fundamental knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. This book will prepare you to take and pass the EC-Council […]

Comments (2)

Defense in depth and network segmentation

Traditional security schemes are incapable of meeting new security challenges of today’s business requirements. Most security architectures are perimeter centric and lack comprehensive internal controls. Organizations which are dependent on firewall security might be overtaxing (asking security mechanism to do more than it can handle). Some of the old firewalls rule set stay intact for […]

Comments (3)


SEO Powered By SEOPressor