Network Security

5K

Solutions

20

Articles & Videos

6K

Contributors

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Refine results

We have hundreds of public facing web pages : do we protect all of them or only those

a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…

714 views
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Hi People,

I'm trying to find the usage of a particular DOMAIN\Service-Account usage in my whole AD domain.

Can anyone here please share which Security Event ID should I be looking / monitor or …

321 views

My company have Ruckus zonedirector1200 and would like to enable wireless client isolation by vlan/subnet. a whitelist was previously created with both IP and MAC address of gateway and DHCP and appli…

619 views

I am looking for a RADIUS server, but I have some quite specific requirements.

1. Ideally Windows based, we only have Windows Servers / Skills, and don;t really have the time to learn Linux.

2. …

1027 views

Hi All,

I'm getting bombarded with the below same System Event ID:

(CODE)

This is from the System Event log in the past 2 days.

What does that means ?

The server getting bombarded is j…

1032 views

Dear Experts.

I am tasked to secure the site for one company and to prove that I did a good job.
I feel I need a small push to get started with ZAP.

Getting started with ZAP seems very obscure.…

313 views

https://www.gobear.com.sg/
https://get.com/sg/credit-cards/
http://www.moneysmart.sg/credit-cards
https://www.singsaver.com.sg/credit-card/best-deals

Q1:
Any security risks comments on the abov…

461 views

Customer has an internal request to configure a new DMZ segment to support some hosting/training initiatives. The Internet edge is a pair of Cisco ASA firewalls running IPS and web content filtering s…

317 views

Is it possible to connect an ip cams directly to cloud service such as google. mega, box, etc?  If so, can EE provide a pathway on the how and considerations for proper install?

720 views

Hi, on 2 occasions one of the users in our west coast office has tried restarting the Remote Desktop server in east coast office but accidentally selects option to shut it down instead of restarting s…

1318 views
The Complete Ruby on Rails Developer Course

Ruby on Rails is one of the most popular web development frameworks, and a useful tool used by both startups and more established companies to build strong graphic user interfaces, and responsive websites and apps.

HI
I'm preparing a company for PCI audit.
Is there any template document which can be used to analyse company's network suggest changes so I can calculate the impact ?

321 views

Can anyone confirm that a user must have "take ownership" permission on a network share in order for ransomware to encrypt the files?

423 views

How can I bypass this? It's driving me nuts. I was able to get to by pass this and login to VPN on one of the machines but I can't on the other.



Also, now I am unable to authenticate the passwo…

422 views

When configuring ASA failover on a live network, will the ASA's at any point in time drop their connection/restart or on anyway stop operation?

316 views

Part of my domain's WHOIS info shows the following:

Tech Name: Hostmaster, TABNet
Tech Organization:
Tech Street: 5 Financial Plaza
Tech City: Napa
Tech State/Province: CA
Tech Postal Code: 9…

719 views

Hi
We have Windows 7 PCs on our network and DCs are windows 2012.
Also we have Linux debian proxy servers for students and we use BLOXX, which is our internet filtering system. Currently YouTube ac…

322 views

Hello All, today I wanted to block traffic from a couple of untrusted IPs on my ASA firewall, which I did by creating an inbound ACL applied to my external interface. The ACL specifies to block any in…

332 views

Whats Tor browser and will it cause any indues on my Mac ~ El Capitan?

Where can I get it and what should I know before using it?

Thanks

1555 views

http://www.google.com.sg/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&sqi=2&ved=0ahUKEwjb3dLts9rOAhUKQI8KHcKQA1UQFgg1MAE&url=http%3A%2F%2Fgo.microsoft.com%2Ffwlink%2Fp%2F%3FLinkId%3D401240&…

329 views
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Our organization currently is on MS Exchange 2010 (with Outlook clients) without encryption.

We are contemplating to embark on encryption using Voltage.

a)Voltage allows users to choose to encry…

331 views

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to get better.

0109 views

Hi All,

Can anyone here please share some steps or process to create secure access for the 3rd party support team ?

Description:
I have created the support account called DOMAIN\AS-Support in m…

845 views

Hi All,

I'd like to know if there is any Powershell script or software that can be used to test what my DOMAIN\Test-Account can do given certain privilege in my AD domain ?

For example: The AD a…

239 views

Our security recently setup a palo alto and it also was configured as DMZ connecting to a Catalyst 2960S. I was asked to configure SPAN on a port to monitor a port channel.
!
interface port-channel …

119 views

Hello

We have a mobile application that we'd like to security test.... The app runs on iOS and android

I understand there are static tests, dynamics tests, manual tests and so on. Does anyone ha…

334 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Network Management
    (12,808)
  2. Security
    (22,635)
  3. Networking
    (88,740)
  4. Hardware Firewalls
    (23,109)
  5. Networking Hardware-Other
    (26,995)
  6. Windows Networking
    (49,774)
  7. OS Security
    (21,408)
  8. Software Firewalls
    (19,675)
  9. Routers
    (46,751)
  10. Vulnerabilities
    (6,561)