Learn to apply best practices and optimize your operations.
Value-added resellers (VARs) and security consultants who formerly used Microsoft's Software Update Services to manage their customers' patches have several options for replacing SUS. Continue Reading
Learn how to survive -- and pass -- the CISSP exam. Continue Reading
This chapter from Richard Bejtlich's "The Tao of Network Security Monitoring: Beyond Intrusion Detection," outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner. Continue Reading
To best meet your customer's expectations when deploying and managing a wireless LAN, you should consider what are the customer's true needs, the physical parameters of the network, security and more, as outlined in this tip. Continue Reading