Do organizations need hardware firewalls when the network already has host-based software firewalls? Wouldn’t it add cost and complexity to networks? Wouldnt system protected by host-based software firewalls just as secure as having a hardware firewall if they are implemented appropriately? “Firewalls actually come in two distinct flavors: software applications that run in the background… Continue reading Hardware or Host Based Firewalls
Category: Infrastructure
Telecommunications and Network Security
Cloud Computing and Data Security
We cannot attribute the beginning of cloud computing to a particular person or time. It evolved with the evolution of Internet and enterprise computing. We may be able to trace its roots all the way back when Dr. Larry Roberts developed the ARPANET in 1969. (Whitman & Mattord, 2016) While the evolution of ARPANET, to Ethernet… Continue reading Cloud Computing and Data Security
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead’s final target — and its covert origins. In a fascinating look inside cyber-forensics, he explains… Continue reading Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon
Secure Mobile Device For Enterprise
With the introduction of cool mobile devices available for the corporate world, executives feel their existing blackberry out of fashion. For a while, blackberry devices ruled the corporate world for mobile communications. They are efficient and highly secure. Blackberry security is still considered the gold standard for enterprise mobile communications. However, with generation Y taking… Continue reading Secure Mobile Device For Enterprise
How Virtual Private Networks Work
How Stuff Works.com has put up a great tutorial in layman’s language on how VPN work – http://computer.howstuffworks.com/vpn.htm
IANA Port Numbers
Here is a list of IANA port number – http://www.iana.org/assignments/port-numbers
Smartphone Security For Enterprise
Smartphones are now rich in features that include network connectivity, enough storage space with efficient processors. These enter your network through authorized corporate users while others are brought in by employees who purchased it themselves.