Beth Cohen - Article Archives - Page 1

Cyber Intrusion

October 16, 2003
Cyber intrusion can be very costly in terms of lost productivity, but small businesses are particularly vulnerable because they have fewer resources to devote to preventive measures. We look at the real costs of cyber intrusion.
READ MORE

Computer Maintenance Essentials

September 29, 2003
There are some fairly simple tasks that if done on a regular basis, can save your company when a computer disaster strikes. Implementing these simple guidelines will not prevent a disaster from happening, but it will allow you to get back to business faster and with fewer tribulations.
READ MORE

RADIUS: Secure Authentication Services at Your Service

July 29, 2003
RADIUS ensures that remote users are who they say they are, keeps track of their network usage, and secures your network infrastructure from intrusion. Learn how deploying RADIUS in-house or as a managed service can benefit you and your company's network.
READ MORE

Searching for Wi-Fi Security Solutions

July 14, 2003
Security has long been the Achilles heel of the wireless industry. Set aside the security issues, though, and the case for wireless networking is overwhelmingly compelling — it's cheap, easy, and portable. Now that the industry is addressing the problem head-on with new solutions for manageable and acceptable network security, Wi-Fi may well be a choice that enterprises should be considering (or reconsidering).
READ MORE

'Good Enough' Security: Network Security on a Shoestring Budget

July 11, 2003
Beth Cohen presents principles of 'good enough' computer security that might not prevent a massive targeted attack, but that will prevent 90% of your problems while keeping your finance department happy and your job secure.
READ MORE

Public Key Infrastructure: Invisibly Protecting Your Digital Assets

June 17, 2003
Public Key Infrastructure (PKI) offers the opportunity to streamline your procedures for protecting and sharing sensitive and valuable information. As Beth Cohen and Debbie Deutsch report, when it comes to protecting your company's valuable digital assets, you owe it to yourself to investigate what doors PKI can open for you and your organization.
READ MORE

'Good Enough' Security: Network Security on a Shoestring Budget

May 29, 2003
In an environment where most of us are continually squeezed for time, resources, and funds, how can we possibly hope to fix and prevent all of our network's security problems? Beth Cohen presents principles of 'good enough' computer security that might not prevent a massive targeted attack, but that will prevent 90% of your problems while keeping your finance department happy and your job secure.
READ MORE

DNSSEC: Security for Essential Network Services

May 12, 2003
DNS has been a major security hole since it was first deployed, but until recently, not much had been done to patch the network service's security vulnerabilities. Beth Cohen reveals the largest DNS security holes, explores how you can protect your network from them, and introduces the IETF's new DNSSEC standard designed to prevent potential future catastrophic attack.
READ MORE

Single Network Identity: Holy Grail or Nightmare?

July 18, 2002
Network managers are well familiar with the chaos multiple passwords and identities can cause with harried user communities. When is a single identity across the network more menace than refuge?
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|