Article Query: Network Security Internet
July 26, 2011

The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network.  All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection.  This same process can be used [...]

July 4, 2011

33% of people use the same password for every web site they access.  62% do not use complex passwords or change their password frequently.  Of the nearly 75 million scam emails sent every day, 2000 claim a victim.  73% of Americans were the victim of some form of cybercrime.  25% of all cybercrime remains unsolved.  The [...]

July 3, 2011

As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online.  As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not [...]

June 30, 2011

The U.S. District Court has ruled that a law suit filed against Google can proceed, paving the way for a  potential class-action lawsuit against the search engine giant for the illegal interception of open residential wireless access point transmissions. Judge James Ware rejected Google’s argument that a dismissal of the case was warranted because the wireless [...]

June 28, 2011

While surfing through my usual news and technology sites I ran across a great article on CircleID by Steve Atkins.  Steve explained how the use of URL shortening services such as Bit.ly and Su.pr can result in your emails being flagged and blocked by spam filters. Following through on Steve’s article I found that he [...]

June 21, 2011

The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software.  The library, crypt_blowfish, allows for fast two-way password encryption.  The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that [...]

March 22, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]

February 19, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]

February 6, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]

January 31, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]