Considering Skype’s Use of SSL
We all know that employees' use of Skype whether for personal or business use is exploding. The service reported an average of 145 million connected users per month in the fourth quarter of 2010,…
Forward Thinking: Network Security Predictions for 2012
Slimmer bodies, faster Internet connections, and better network coverage makes use of the latest smartphones and mobile devices all the more appealing to the public—and to hackers.
What is a cloud virtual private network (VPN)?
*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWan
Top VPN Questions Answered
*Editor’s Note: This questions originally appeared in TechTarget’s SearchEnterpriseWan
What Network Monitoring Tools Give you Visibility into Corporate VPNs?
*Editor's Note: This column originally appeared in TechTarget's SearchEnterpriseWan
SSL Myth Busting: Java Authentication and Authorization Services (JAAS) Framework Handles All Protocols and Mechanisms Securely [Nope.]
Onto the next post in our series debunking SSL myths. Today’s myth: Java Authentication and Authorization Services (JAAS) framework handles all protocols and mechanisms in a secure manner.
Why You Need a VPN that Supports Seamless Roaming
By Sylvia Rosen
Rainer on Ars Technica: Live, VPN!
Ars Technica recently ran a piece "Die, VPN! We're all 'telecommuters' now—and IT must adjust" arguing that in today's mobile world, VPNs should just be abandoned and IT should adjust to relying on…
Breaches Raise Questions about SSL Security
The recent breach at Dutch digital certificate authority DigiNotar is just the latest in series of troubling SSL hacks. Earlier this year, Comodo alerted its customers to a serious SSL breach that…
Firewall Rule Set Complexity: Good Configuration Comes in Small Policies
By Dr. Avishai Wool