Why Identification and Authentication Matter, Part 2
By Joe Schembri Last week, I provided a quick summary of identification and authentication. Continuing with this, today I’ll dive into why these factors are so critical for remote access solutions....
View ArticleHow can I make sure my VPN is encrypted and working properly?
*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com By Rainer Enders, CTO of Americas for NCP engineering The simplest way to do this is to act like a hacker....
View ArticleThe Benefits and Pitfalls of Using Sandboxing Techniques in SSL VPN, Part 2
*Editor’s Note: This is the second post in a two-part series. By Dr. Matthias St. Pierre, Senior Developer at NCP engineering In my previous post on sandboxing, I explained why this security function...
View ArticleWhat We’re Reading, Week of 11/5
Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools...
View ArticleWhat We’re Reading: Week of 12/3
eWeek – Security Issues Pose Hurdles for BYOD Migration: Gartner Government Computing News – 10 predictions for government IT in 2013 Network World – Apple iOS vs. Google Android: It comes down to...
View ArticleWhy VPNs Matter for Governments, Part 2
Editor’s Note: Part one of this two-part series ran last week. By Nicholas Greene Why are VPNs implemented? One word: mobility. Constant connectivity, ease of communication, increased efficiency and...
View ArticleHow Can I Ensure App Store Security for my Remote Users?
*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com. Question: Remote workers in my company access application stores through their mobile devices. How can I ensure...
View ArticleWhat We’re Reading: Week of 12/17
CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT...
View ArticleForward Thinking: Network Security Predictions for 2013
The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks...
View Article
More Pages to Explore .....