How much authentication is good enough?
Don't fight it, work with it.
Get tough with MAC address filtering and disassociation
How a game at DefCon pitted hackers against each other.
Even a secured down firewall tells the world a lot about you. Here’s how to stop people finding out your secrets from your firewall.
Signal distribution keeps Wi-Fi kit under lock and key
IP uses something called ARP to map IP addresses to the physical addresses that underpin them. This can compromise security, of course.
IOS has a new password security feature. Users beware.
Some issues to consider when running IPSec security over a VoIP network.
How to write a good security policy while avoiding the usual pitfall – nobody can understand a word of it.
This article highlights some of the security issues around the use of dynamic code environments, such as SSI, ASP and PHP.
A week in the life of an IT manager
Web servers are sitting targets for malicious attack. Here is a basic guide to server protection.
How to track down the right Linux firewall for your circumstances
If the onslaught of Trojan horses, worms and viruses has taught us anything, it's that software patches are as vital to network security as virus updates.
There's more to network security than a single perimeter.
Are multiple SSIDs a great idea, or too cumbersome?
Key questions when specifying a data centre automation platform.
Encryption, authentication and plugging leaks.
Jump to another channel and call in the law!
Put the paper work on line - and don't make anything go boom
Do VPNs and look for hotspots with multiple SSIDs.
Issues to weigh up before buying that most essential of modern security workhorses – the firewall.
What are the risks of using VPNs and how can you tell if a user becomes compromised? Read up on prevention and cure.
And maximise the life of some of your older hardware.