VPNs (Virtual Private Nightmares)
by Steven Drew - Monday, 02 July 2004.
VPNs will likely continue to be the weakest link in an organization's security infrastructure for some time to come. Implementing these recommended actions should help security teams minimize, and hopefully someday eliminate, the impact from outbreaks entering through the VPN. Although these methods will help to better defend your enterprise, they are by no means a substitute for an effective, comprehensive Threat Management strategy. Such a strategy must include prevention, discovery, assessment, detection, response and early warning. Implementing this strategy will provide a security team with the best chance of efficiently protecting your enterprise from existing and emerging threats.



Steven Drew is Chief Operating Officer of LURHQ Corporation, a trusted provider of Managed Security Services. Founded in 1996, LURHQ protects the critical information assets of more than 400 customers by offering integrated Threat Management services. LURHQ's 24X7 Threat Management capabilities enable customers to enhance their security posture while reducing the costs of managing their security environments.

Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //