Posts Tagged ‘hackers’

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools Get Smarter To Nab Financial Data SearchSecurity – Remote access Trojan evades detection using mouse functions Share this:EmailFacebookPrint

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools Get Smarter To Nab Financial Data SearchSecurity – Remote access Trojan evades detection using mouse functions Share this:EmailFacebookPrint

*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com By Rainer Enders, CTO of Americas for NCP engineering The simplest way to do this is to act like a hacker. Snoop around the network traffic, either on the device itself or a port on the network. In the case of IPsec, for example, you would see encapsulating [...]

What We’re Reading, Week of 1/2

Posted: 6th January 2012 by VPN Haus in Highlights
Tags: , , ,

Help Net Security, Securing Android for the Enterprise Infosec Island, How to Re-Awaken Your Inner Hacker InfoWorld, New year, same old security passwords eWeek, Enterprises Need Encryption to Secure Private Data Share this:EmailFacebookPrint

Last week’s post on Branch Networking focused on High Availability, so this week we’ll take a dive into central management. As a quick overview, a central VPN management system is required for effective networking of branch offices. Even if there are only a few branch offices, the time and money that have to be spent [...]