Explore Network Security on Experts Exchange

Expert Solutions for Your Tech Problems

Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network a...

Read more
  • 8.0K Content
  • 4.1K Contributors

Expert Spotlight
COG Lead Engineer

I'm Shaun Vermaak. I love tech and how it improves life and business. Did you find what you were looking for?

Troubleshooting Solution

Symantec Backup Exec 2010 services keep stopping.

78
We've had Symantec Backup Exec 2010 running just fine on this server but all of a sudden its …
Article
Video
Post

The recent malware attack brings to light the need for more …

The recent malware attack brings to light the need for more security and privacy online. The Experts…
Post

What technology do you think is a fad that won’t last?  …

6
What technology do you think is a fad that won’t last?
Not sure it really …
Post

With great knowledge comes great responsibility. How would …

2
With great knowledge comes great responsibility. How would you handle it? Let's explore the internal…
Advice Solution

Restricting M365 Basic Plan Access to Office Network

byGautam
5

Dear Experts,

 

We have a leased line for Internet terminated at our Sophos XGS 3100 firewall. We have

Post

NYS 20th Annual Cyber Security Conference   I will be …

7
NYS 20th Annual Cyber Security Conference

I will be attending this conference in Albany, N.Y. this…
Advice Solution

Handling Files from Medusa Ransomware-Affected System

byGautam
5

Dear Experts,

 

We have certain data (spreadsheets, Word documents, PDFs, CAD drawing files) stored on

Article

Hackers Guide to Being Hacked: How “Bad Guys” Take Control, and How to Take it Back.

8
"Oh crap. I think we've been hacked."

That's the last sentence you ever want to hear from your IT…
Troubleshooting Solution

SSL Cert with Wrong Hostname: team felt this is a false penetration test finding

bysunhux
26

 

Refer to project manager's assertion below?  He's claiming the penetration tester's finding is a

Advice Solution

SSO integration with Third party

13

Hi experts,

We have a vendor that needs SSO integration between their platfom and our Microsoft Entra

Advice Solution

Kali Linux VM as a Jump Host for 3rd Party VAPT

9

Hi


We hired a 3rd party company to perform a black box VAPT on our internal & external apps, servers

Advice Solution

Chrome.exe making outbound connections to suspicious IPs

10

Hi Experts

We're seeing alerts on our XDR where chrome.exe and msedge.exe are attempting outbound

Post

Organizations in 99 countries are being targeted and hacked …

Organizations in 99 countries are being targeted and hacked by “WannaCry” ransomware, which takes …
Post

btan updated his Ransomware article with points about the …

btan updated his Ransomware article with points about the recent WCry ransomware.  See FAQ #7, #9 …
Post

Today's ransomware attack is spreading by SMB through the …

1
Today's ransomware attack is spreading by SMB through the local network and is known as WannaCry.
Post

Gain the added security of knowing you are prepared and …

Gain the added security of knowing you are prepared and properly protected against future ransomware…
Post

Breaking News: The Latest New Petya isn't Ransomware. It's …

1
Breaking News: The Latest New Petya isn't Ransomware. It's actually a destructive wiper malware.

Do more with Experts Exchange.


Get Answers

Join a Group Discussion

Collaborate

Monitor your Site

Explore solutions and more