|
|||||||||||||
What's your information security gap?
[Mark Egan]
Symantec CIO Mark Egan examines the need for an information security program and attempts to identify the gap that exists between the perception of security and true network security. In this column he provides a three step process for identifying and closing the information security gap as well as implementing processes to keep the gap closed.
Top 5 ways to make your network more secure
[Tom Lancaster]
About this time of year, network administrators experience an event as common as it is frustrating: budget requests. This year, do yourself a favor and get a step ahead. Since security is always getting short-changed in the budget, I've put together a quick list to get you thinking about ways to improve your network.
Administrator Academy: Security series
[Firewall.cx]
Guide to network security
This guide introduces you to the main components in whole network security. You'll find articles, tutorials, tips, tools, white papers and more to pump up your network security quickly.
Containment is essential for combating attacks
Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage.
Featured Topic: VoIP security
What's one of the biggest roadblocks to deploying VoIP? Security issues, say our readers. Learn how to keep your implementation safe and reliable.
Gray Hat Hacking: The Ethical Hacker's Handbook, Chapter 4
Pen-Testing Process
Chapter 4 of covers the non-technical and process aspects of ethical hacking. It discusses the difference between types of assessments, how to get started and continues with steps to a performing a successful assessment. (Reproduced from the book Gray Hat Hacking: The Ethical Hacker's Handbook, ISBN 0072257091, Copyright 2004, McGraw-Hill Companies. Reproduced by permission of McGraw-Hill, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)
|
|
|||||||||||||||||||||||||||
This e-newsletter is published by TechTarget, the most targeted IT media and events company. Copyright 2004 TechTarget. All rights reserved. To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://searchTechTarget.techtarget.com/u?cid=496721&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: |
||||