Ask the Experts
Ask the Experts
Network security management
-
How to ensure secure email exchange with external business partners
When sensitive documents are frequently travelling back and forth between a company and its business partners, email security becomes very important. In this expert response, Peter Wood gives advice on how to create a secure email exchange. Continue Reading
-
Database activity monitoring technology vs. SIEM tools
In this expert response, Peter Wood explains the difference between database activity monitoring systems and security information and event management (SIEM) tools. Continue Reading
-
Is it enough to analyse log files, or is an IDS necessary?
The more network data you have to analyse, the better. In this expert response, Peter Wood explains what tools can provide the information you need. Continue Reading
-
How to address a spike in TCP and UDP flows
Have an unusual spike in TCP and UDP flows? Expert Peter Wood explains how to zero in on the problem. Continue Reading
-
What to look for in a network security audit
What to look for in a network security audit? That's a short question with a big answer, says expert Peter Wood. Continue Reading
-
How to manage logs
Neil O'Connor reviews when you should be hanging on to your network logs. Continue Reading
-
Are iPhone encryption features on the way?
Expert Ken Munro explains why the iPhone's lack of encryption features has kept it from being a reliable enterprise device -- for now. Continue Reading
-
How to achieve laptop data security
In this expert response, learn how to achieve laptop security and prevent laptop data theft with encryption. Continue Reading