Network Security - Infoworld http://www.infoworld.com/t/21645 en 7 reasons to deploy Wi-Fi security in Enterprise mode http://www.infoworld.com/d/security/7-reasons-deploy-wi-fi-security-in-enterprise-mode-240008?source=rss_network_security <p>Although it's tempting to use the Personal mode of Wi-Fi security, which is easy to setup and use, businesses and organizations really need to use the Enterprise mode of WPA2--also known as 802.11i. Although it requires a RADIUS server to do the 802.1X authentication and is more complex to setup, it provides superior Wi-Fi security and can save you time and money in the long run.</p> <p>Here are several reasons why businesses and organization should utilize Enterprise-level Wi-Fi security.</p> Networking Security Wi-Fi Wireless LAN Network Security IDG Insider Wed, 09 Apr 2014 10:00:00 +0000 admin 240008 at http://www.infoworld.com The Linux security spell is broken http://www.infoworld.com/t/cringely/the-linux-security-spell-broken-238717?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/11TCseemore_hp.jpg" alt="The Linux security spell is broken" width="243" height="182" align="right" /></div><p>I've been dipping into the <a href="http://www.infoworld.com/t/cringely/sad-sexy-or-self-sufficient-your-robot-overlords-await-238438">coming-technology</a>-<a href="http://www.infoworld.com/t/cringely/sad-sexy-or-self-sufficient-your-robot-overlords-await-</p> Applications Computer Hardware Data Center Open Source Software Security Facebook Cringely Servers Open Source Software Network Security Social Networking Data Center Thu, 20 Mar 2014 10:00:00 +0000 Robert X. Cringely 238717 at http://www.infoworld.com 8 ways to improve wired network security http://www.infoworld.com/d/security/8-ways-improve-wired-network-security-238479?source=rss_network_security <p>We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. After all, a war-driver can detect your SSID and launch an attack while sitting out in the parking lot.</p> <p>But in a world of insider threats, targeted attacks from outside, as well as hackers who use social engineering to gain physical access to corporate networks, the security of the wired portion of the network should also be top of mind.</p> Networking Security Authentication Encryption Network Security Mon, 17 Mar 2014 14:27:27 +0000 admin 238479 at http://www.infoworld.com IPv6 could open networks up to zero-day attacks http://www.infoworld.com/d/networking/ipv6-could-open-networks-zero-day-attacks-238259?source=rss_network_security <p>The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation.</p> <p>But private security and technology experts say those concerns are largely overstated, and that a safe transition could happen right away, if you do it correctly.</p> Networking Security IPv6 Network Security IDG Insider Mon, 17 Mar 2014 10:00:00 +0000 uphan 238259 at http://www.infoworld.com 7 steps to choosing security software http://www.infoworld.com/d/security/7-steps-choosing-security-software-238126?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="7 steps to choosing security software" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Naomi Anderson</p></em></div> Security Network Security Security Tue, 11 Mar 2014 10:00:00 +0000 Roger A. Grimes 238126 at http://www.infoworld.com Why you need to segment your network for security http://www.infoworld.com/t/network-security/why-you-need-segment-your-network-security-237589?source=rss_network_security <p>My job over the last thirteen years as a penetration tester has given me a unique understanding of security from an attacker's point of view. I have conducted hundreds of penetration tests on organizations ranging from Federal government nuclear weapons labs, to banks, city governments, and practically everything in between. I know what makes an attacker's job easy, and what makes it difficult or practically impossible.</p> Network Security IDG Insider Wed, 05 Mar 2014 11:00:00 +0000 Pete Babb 237589 at http://www.infoworld.com To build the best defense, know which attack is which http://www.infoworld.com/d/security/build-the-best-defense-know-which-attack-which-237052?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/laptop_spy.jpg" alt="To build the best defense, know which attack is which" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p> </em></div> <p>As you mount your defense against the bad guys, it's important to make the distinction between the two major types of attack: the initial compromise and movement.</p> Security Cyber Crime Hacking Network Security Password Security Security Tools Security Tue, 25 Feb 2014 11:00:00 +0000 Roger A. Grimes 237052 at http://www.infoworld.com 6 lessons learned about the scariest security threats http://www.infoworld.com/d/security/6-lessons-learned-about-the-scariest-security-threats-236704?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="6 lessons learned about the scariest security threats" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Naomi Anderson</p></em></div> Security IT Strategy Cyber Crime Data Security Hacking Malware Network Security Social Engineering Web Security Windows Security Wireless Security Security Mon, 24 Feb 2014 11:00:00 +0000 Jason Snyder 236704 at http://www.infoworld.com Where PCI compliance fails: Security testing, network monitoring http://www.infoworld.com/t/security-standards/where-pci-compliance-fails-security-testing-network-monitoring-235948?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/cash_register.jpg" alt="Where PCI compliance fails: Security testing, network monitoring" width="243" height="182" align="right" /><br /><em><p align="right">Credit: shuchun ke</p></em></div> Networking Security Compliance Network Monitoring Intrusion Detection Network Security Security Standards Vulnerability Assessment Fri, 07 Feb 2014 19:57:46 +0000 InfoWorld Tech Watch 235948 at http://www.infoworld.com The processes and tools behind a true APT campaign http://www.infoworld.com/d/security/the-processes-and-tools-behind-true-apt-campaign-235095?source=rss_network_security <p>APTs are both nightmares and the stuff of legend for business leaders and security managers across the globe. In this series, CSO will examine the processes and tools used by attackers during these types of campaigns, and various mitigating factors.</p> <h3>[<a href="http://www.csoonline.com/article/734110/spear-phishing-paves-road-for-advanced-persistent-threats">Spear phishing paves road for advanced persistent threats</a>]</h3><p>&nbsp;</p> Security Data Loss Prevention Endpoint Protection Network Security Security Management IDG Insider Fri, 31 Jan 2014 11:00:00 +0000 uphan 235095 at http://www.infoworld.com Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System http://www.infoworld.com/d/security/cisco-fixes-remote-access-vulnerabilities-in-cisco-secure-access-control-system-234354?source=rss_network_security <p>Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization.</p> <p>Cisco ACS is a server appliance that enforces access control policies for both wireless and wired network clients. It's managed through a Web-based user interface and supports the RADIUS (Remote Access Dial In User Service) and TACACS+ (Terminal Access Controller Access-Control System Plus) protocols.</p> Networking Security Cisco Systems Authentication Intrusion Detection Network Security Patch Management Vulnerability Assessment Thu, 16 Jan 2014 13:13:10 +0000 admin 234354 at http://www.infoworld.com Lucky 2013: Count these 5 security blessings http://www.infoworld.com/d/security/lucky-2013-count-these-5-security-blessings-233003?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/numbers_1_to_5.jpg" alt="Lucky 2013: Count these 5 security blessings" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Authentication Cyber Crime Encryption Hacking Network Security Security Management Windows Security Security Mon, 23 Dec 2013 11:00:00 +0000 Roger A. Grimes 233003 at http://www.infoworld.com Let the NSA spy on us -- we're still moving to the cloud http://www.infoworld.com/d/cloud-computing/let-the-nsa-spy-us-were-still-moving-the-cloud-232314?source=rss_network_security <p>Guess what? The NSA scandal might have freaked out a few CIOs, but it isn't delaying their move to cloud computing. I'm not surprised: They really have no choice in the shift to the cloud, considering the alternatives are not as effective.</p> Cloud Computing Security Edward Snowden Internet Privacy Network Security Cloud Computing Tue, 10 Dec 2013 11:00:00 +0000 David Linthicum 232314 at http://www.infoworld.com D-Link issues fixes for firmware backdoor in routers http://www.infoworld.com/d/networking/d-link-issues-fixes-firmware-backdoor-in-routers-231980?source=rss_network_security <p>D-Link <a href="http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10001" target="_blank">published patches</a> on Monday for a firmware coding goof that could allow attackers to remotely change the settings of several of its router models.</p> Networking Security Network Router Network Security Patch Management Vulnerability Assessment Tue, 03 Dec 2013 13:18:07 +0000 admin 231980 at http://www.infoworld.com 7 essentials for creating a greenfield environment http://www.infoworld.com/d/security/7-essentials-creating-greenfield-environment-231969?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/globe_laptops.jpg" alt="7 essentials for creating a greenfield environment" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Network Security Security Management Security Tue, 03 Dec 2013 11:00:00 +0000 Roger A. Grimes 231969 at http://www.infoworld.com Akamai to buy DDoS protection specialist Prolexic http://www.infoworld.com/d/the-industry-standard/akamai-buy-ddos-protection-specialist-prolexic-231866?source=rss_network_security <p>Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for $370 million in cash.</p> <p>Akamai, in Cambridge, Mass., runs one of the world's largest content delivery networks with 137,000 servers in 87 countries. Its clients span a variety of industries and include a third of the companies on the Fortune Global 500 list.</p> Networking The Industry Standard Internet M&A Network Security Mon, 02 Dec 2013 15:36:46 +0000 admin 231866 at http://www.infoworld.com Malice or mistake? Cyber sleuths weigh in on Internet hijack attack http://www.infoworld.com/t/network-security/malice-or-mistake-cyber-sleuths-weigh-in-internet-hijack-attack-231445?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/china_internet_cafe.jpg" alt="Malice or mistake? Cyber sleuths weigh in on Internet hijack attack" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Reuters/Stringer Shanghai</p> Security Internet Cyber Crime Network Security Fri, 22 Nov 2013 11:00:00 +0000 InfoWorld Tech Watch 231445 at http://www.infoworld.com Welcome to the era of encryption by default http://www.infoworld.com/t/encryption/welcome-the-era-of-encryption-default-231332?source=rss_network_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/encryption_padlock_hp.gif" alt="Welcome to the era of encryption by default" width="243" height="182" align="right" /></div><p>With Yahoo promising "<a href="http://www.pcworld.com/article/2064507/in-the-wake-of-nsa-spying-yahoo-promises-encryption-everywhere.html" target="_blank">encryption everywhere</a>," Google <a href="http://www.csoonline.com/article/743490/ex Security Encryption Network Security Thu, 21 Nov 2013 11:00:00 +0000 InfoWorld Tech Watch 231332 at http://www.infoworld.com Arbor Networks introduces cloud-based anti-DDoS service http://www.infoworld.com/d/security/arbor-networks-introduces-cloud-based-anti-ddos-service-230649?source=rss_network_security <p>Arbor Networks today introduced its first cloud-based distributed denial-of-service (DDoS) mitigation service to protect enterprises against large-scale attacks intended to swallow up available bandwidth or knock application servers offline.</p> Cloud Computing Security Cloud Security Web Services Network Security Tue, 12 Nov 2013 12:57:23 +0000 admin 230649 at http://www.infoworld.com Vulnerabilities in some Netgear router and NAS products open door to remote attacks http://www.infoworld.com/d/security/vulnerabilities-in-some-netgear-router-and-nas-products-open-door-remote-attacks-229399?source=rss_network_security <p>Vulnerabilities in the management interfaces of some wireless router and network-attached storage products from Netgear expose the devices to remote attacks that could result in their complete compromise, researchers warn.</p> <p>The latest hardware revision of Netgear's N600 Wireless Dual-Band Gigabit Router, known as WNDR3700v4, has several vulnerabilities that allow attackers to bypass authentication on the router's Web-based interface, according to Zachary Cutlip, a researcher with security consultancy firm Tactical Network Solutions.</p> Networking Security Network Router Network Security Vulnerability Assessment Wed, 23 Oct 2013 18:47:04 +0000 admin 229399 at http://www.infoworld.com