Post of category Posts

Posts · Rethink Remote Access

LogMeIn is not a viable VPN alternative

Saw a post recent on Download.com about LogMeIn, a web-based remote access utility that the author claims "makes an excellent case for ditching the VPN entirely."

Posts

Another security "joke"

Missing SFO Laptop With Sensitive Data Found

Posts

Another security "joke"

Missing SFO Laptop With Sensitive Data Found

64-Bit · Posts

Start64.com

We've recently discovered a great new resource (well, new to us, at least!) called Start64.com - a news and discussion forum for 64-bit software, security and OS issues. As the first provider of a VPN...

Posts

Secure Entry Client for Symbian

NCP has just announced the release of its Secure Entry Client for Symbian OS-based mobile devices.  The new IPSec VPN client can be used on mobile devices such as the Nokia Eseries, which run Symbian...

64-Bit · Posts

SSL versus IPsec: some considerations

We asked NCP's Joerg Hirschmann to take look at the arguments presented in Reliable Systems' recent post, "Remote Access for Everyone," and offer some respectful criticism of the case made for SSL...

Posts · Rethink Remote Access

Evading the "man in the middle"

In response to our discussion yesterday about "Man in the Middle Attacks," Rene points us to this article in Wired, which describes how Colombian government forces 'masqueraded' as FARC...

Posts · Rethink Remote Access

Evading the "man in the middle"

In response to our discussion yesterday about "Man in the Middle Attacks," Rene points us to this article in Wired, which describes how Colombian government forces 'masqueraded' as FARC...

Posts · Rethink Remote Access

Why Bobbleheads are Better than Corporate Security Checklists

Recently we've seen some discussion around the blogosphere about corporate security checklists - Kenneth Belva, for one, extols their virtues in a recent post on BlogInfoSec - In Praise of the...

Posts · Rethink Remote Access

Inside and outside the network perimeter

Frank Cassano has written a series of posts at BlogInfoSec titled "Assessing Your Organization's Network Perimeter" (see Part 1 and Part 2). We had a quick chat with NCP's Rene Poot to get his...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK