Articles
Windows FAQ
"McAfee LiveSafe" Installed Program on Windows 7 - What is the i...
"Microsoft Office 365 ProPlus - en-us" Installed Program on Wind...
"Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.21005" I...
"Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.21005" I...
"Power Manager" Installed Program on Windows 7 - What is the ins...
Who's Online
11 user(s) are online (3 user(s) are browsing Forum)

Members: 0
Guests: 11

more...
   All Posts (iPhone)


(1) 2 3 4 ... 33 »


Question regarding configuration options for Chromecast / AppleTV and using BYOD devices to cast via
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
question regarding configuration options for Chromecast / AppleTV and using BYOD devices to cast via the network.

Run a common practice wireless network; 802.1x, client isolation enabled (ruckus), vlan'd and firewall (rules) access to LAN (via sonicwall).
The client isolation doesn't help, likewise with differing networks.

Is there a better setup method? (AppleTV can use LAN so firewall rules would apply, Chrome cast?)
Do you setup another network for trusted casting devices?, allow vlan routing / firewall / gateway but firewall out stuff it doesn't need access to?


Posted on: 2016/10/25 11:14
Transfer the post to other applications Transfer


Learn from the past: Ensure a secure future of information security
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
Learn from the past: Ensure a secure future of

information security


To ensure the future of information security,

enterprises must learn from the past, launch proper

training and install the right technologies.

Continue Readinghttp://searchsecurity.techtarget.com

Posted on: 2016/8/7 18:26
Transfer the post to other applications Transfer


Improve corporate data protection with foresight, action
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
Improve corporate data protection with foresight, action

Better corporate data protection demands foresight and concrete action. Learn why breach training, monitoring and early detection capabilities can minimize damage when hackers attack.

Posted on: 2016/7/2 20:24
Transfer the post to other applications Transfer


Is a DNSSEC implementation an enterprise necessity?
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
Is a DNSSEC implementation an enterprise necessity?

While there are numerous security benefits to a DNSSEC implementation, there are drawbacks as well. Expert Kevin Beaver explains. Continue Reading http://searchsecurity.techtarget.com/ ... n-an-enterprise-necessity

Posted on: 2016/5/14 21:12
Transfer the post to other applications Transfer


How can a compliance management plan help enterprises avoid fatigue?
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
How can a compliance management plan help enterprises avoid fatigue?

Complex compliance mandates can lead to compliance fatigue. Expert Mike Chapple explains how to develop an effective compliance management plan.

Posted on: 2016/4/4 23:11
Transfer the post to other applications Transfer


Comparing the best Web application firewalls in the industry
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
Comparing the best Web application firewalls in the industry

Expert Brad Causey compares the best Web application firewalls on the market across three types of product types: cloud, integrated and appliance

Posted on: 2016/3/14 16:54
Transfer the post to other applications Transfer


STIX (Structured Threat Information eXpression)
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
STIX (Structured Threat Information eXpression)

STIX (Structured Threat Information eXpression) is an XML programming language that allows cybersecurity threat data to be shared.Continue Reading

Posted on: 2016/2/29 17:33
Transfer the post to other applications Transfer


How will the Cybersecurity Information Sharing Act affect enterprises?
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
How will the Cybersecurity Information Sharing Act affect enterprises?

The Cybersecurity Information Sharing Act has ruffled some feathers in the security industry.

Posted on: 2016/2/12 22:47
Transfer the post to other applications Transfer


How is the NIST Cybersecurity Framework being received?
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
How is the NIST Cybersecurity Framework being received?

The NIST Cybersecurity Framework gets mixed reviews, but it could be a good starting point for organizations looking to better manage cybersecurity

Posted on: 2016/1/27 20:37
Transfer the post to other applications Transfer


How can security leaders create a positive work environment?
Home away from home
Joined:
2007/11/10 10:23
Group:
Registered Users
Posts: 329
Level : 16; EXP : 94
HP : 0 / 398
MP : 109 / 10702
Offline
How can security leaders create a positive work environment?

It's the responsibility of security leaders to create a positive work environment for security teams, which can be tough to do in such a demanding field.

Posted on: 2016/1/11 18:26
Transfer the post to other applications Transfer



 Top
(1) 2 3 4 ... 33 »




Copyright (c) 2015 FYIcenter.com
Search
Main Menu
Login
Username:

Password:

Remember me



Lost Password?

Register now!