Quantcast
Channel: VPN Haus » security
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Readers’ Poll – Security Project Problems

Take Our Poll

View Article



Image may be NSFW.
Clik here to view.

Why Identification and Authentication Matter, Part 2

By Joe Schembri  Last week, I provided a quick summary of identification and authentication. Continuing with this, today I’ll dive into why these factors are so critical for remote access solutions....

View Article

Image may be NSFW.
Clik here to view.

How can I make sure my VPN is encrypted and working properly?

*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com By Rainer Enders, CTO of Americas for NCP engineering The simplest way to do this is to act like a hacker....

View Article

Image may be NSFW.
Clik here to view.

The Benefits and Pitfalls of Using Sandboxing Techniques in SSL VPN, Part 2

*Editor’s Note: This is the second post in a two-part series.  By Dr. Matthias St. Pierre, Senior Developer at NCP engineering In my previous post on sandboxing, I explained why this security function...

View Article

Image may be NSFW.
Clik here to view.

What We’re Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools...

View Article


Image may be NSFW.
Clik here to view.

What We’re Reading: Week of 12/3

eWeek – Security Issues Pose Hurdles for BYOD Migration: Gartner Government Computing News – 10 predictions for government IT in 2013 Network World – Apple iOS vs. Google Android: It comes down to...

View Article

Image may be NSFW.
Clik here to view.

Why VPNs Matter for Governments, Part 2

Editor’s Note: Part one of this two-part series ran last week.  By Nicholas Greene Why are VPNs implemented? One word: mobility. Constant connectivity, ease of communication, increased efficiency and...

View Article

Image may be NSFW.
Clik here to view.

How Can I Ensure App Store Security for my Remote Users?

*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com. Question: Remote workers in my company access application stores through their mobile devices. How can I ensure...

View Article


Image may be NSFW.
Clik here to view.

What We’re Reading: Week of 12/17

CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT...

View Article


Image may be NSFW.
Clik here to view.

Forward Thinking: Network Security Predictions for 2013

The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images