Archive for the ‘Network security’ Category

Hospital Operator Takes Network Offline After Major Cyberattack

A Californian hospital operator has made the move to take is network offline after it was hit by a major cyberattack.  Reports state that the Scripps Health computer network that operates across half a dozen hospitals and a number of outpatient facilities in the San Diego, California area was forced to move to offline procedures […]

Leave a Comment

5G network slicing vulnerability leaves enterprises exposed to cyberattacks

security in 5G networks

Leave a Comment

Developing a Strong Security Posture in the Era of Remote Work

Leave a Comment

Nmap Cheat Sheet

Leave a Comment

How do I select a network monitoring solution for my business?

Network monitoring is essential for any organization with a network. Requirements may vary, but in general any IT team is going to need a single, comprehensive solution that shows the entire network in context and makes diagnosing network issues fast and easy. An effective solution should be able to discover every device connected to the […]

Leave a Comment

Every Linux Networking Tool

Every Linux Networking Tool – By Julia Evans  Subscribe in a reader

Leave a Comment

Top 5 excellent Antivirus Protection of 2017

Excellence is achievable but perfection is not. Find an excellent anti-virus product based on your requirements.   Malware are evolving faster than ever, so it’s encourging to discover that the latest generation of antivirus (AV) are better equipped to handle this evolving pace of change. Information security best practice recommends that every PC should run […]

Leave a Comment

5 Essentials changes to harden Network Infrastructure

First principle to understand vulnerability assessment, one can’t exploit the vulnerability if a threat does not exist. So by default the services (ports) which are not required in a system (server) will present an unnecessary threat to be exploited if specific vulnerability exists in a system. These unnecessary and unattended services are also the prime […]

Comments (1)

Palo Alto Networks takes Firewalls to next Level

Ashlee Vance, Bloomberg Businessweek For the past 15 years or so, security pros have relied on the trusty firewall and other hardware to keep bad guys from running amok on corporate networks. For the most part, this has meant blocking tainted e-mails and keeping workers away from harmful websites. The latest wave of Web services, […]

Comments (5)

How IPSEC Stops the Three Most Common Attacks Against Your Network

Leave a Comment

How to configure your Linksys router for maximum security

Leave a Comment

Security and vulnerability assessments

Must have official EC-Council guide to security and vulnerability assessments! Network Defense: Security and Vulnerability Assessment (Ec-Council Press Series: Network Defense) This book will provide you with the fundamental knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. This book will prepare you to take and pass the EC-Council […]

Comments (2)

Defense in depth and network segmentation

Traditional security schemes are incapable of meeting new security challenges of today’s business requirements. Most security architectures are perimeter centric and lack comprehensive internal controls. Organizations which are dependent on firewall security might be overtaxing (asking security mechanism to do more than it can handle). Some of the old firewalls rule set stay intact for […]

Comments (3)