While rating the IT security as "generally effective," an audit of the Nuclear Regulatory Commission's Region IV office found several lapses that could leave sensitive data exposed. An independent ...
As reports of security threats and data breaches rise, clients want added assurance that an organization can be trusted with their confidential information. As businesses strive to align with industry ...
90+% of Cisco Router administrators are CLI jockeys, myself included. However, there are several GUI tools that can help you manage and secure your Cisco routers very quickly. The one I want to focus ...
How can you confirm your systems are configured appropriately and maintain that configuration over time? In our tests, Preventsys Network Audit and Policy Assurance 1.5 proved to be a flexible, ...
Wireshark is a network protocol analyzer that helps you keep your computer secure. With the help of this tool, you can scrutinize and probe network packets in real-time. In this post, we will talk ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
Data security, once the realm of the IT department, has catapulted into a headline-grabbing topic in 2018, especially in light of Facebook CEO Mark Zuckerberg’s testimony before Congress in April.
Security terms are sometimes confusing. And like all expressions, sometimes the definition can get subtly changed over time. An example of this is “security assessment” versus “penetration test”. I ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results