Network security
Enterprise cyberdefense strategies must include network security best practices. Get advice on essential network security topics such as remote access, VPNs, zero-trust security, NDR, endpoint management, IoT security, hybrid security, Secure Access Service Edge, mobile security and more.
Top Stories
-
Tip
19 Mar 2026
What AI zero days mean for enterprise cybersecurity
AI's ability to find and exploit high-severity zero days at speed and scale presents both attackers and defenders with game-changing opportunity. Here's what CISOs should know. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Tip
19 Mar 2026
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business. Continue Reading
By
-
Tip
17 Jan 2008
Firewall redundancy: Deployment scenarios and benefits
There are, however, several good reasons to deploy multiple firewalls in your organization. Let's take a look at a few scenarios. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
04 Jan 2008
Does Teredo present security risks to the enterprise?
Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Ed Skoudis explains why this function isn't as innocent as it seems. Continue Reading
By- Ed Skoudis, SANS Technology Institute
-
Answer
27 Nov 2007
Will FTP ever be a secure way to transfer files?
A SearchSecurity.com member asks our network security expert Mike Chapple: Is the File Transfer Protocol a secure way to transfer files? As one of his many monthly responses to readers, Chapple reveals a better alternative to FTP. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
21 Aug 2007
Should a router be placed between the firewall and DMZ?
Modern firewalls have the ability to serve as a router, negating the need of another device on a network. There are exceptions to this router rule, however. Network security expert Mike Chapple explains. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
31 Jul 2007
How does SSL 'sit' between the network layer and application layer?
SSL is neither a network layer protocol nor an application layer protocol. In this SearchSecurity.com Q&A, Michael Cobb explains how SSL "sits" between both layers. Continue Reading
By -
Answer
22 Apr 2007
How do a DMZ and VPN work together?
In this SearchSecurity.com Q&A, network security expert Mike Chapple explains the three distinct network zones in a typical firewall scenario and reveals how the DMZ and VPN, in particular, co-exist. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
27 Mar 2007
What's the harm in removing the RFID chip in credit cards?
If you're concerned that a credit card's RFID chip is putting your personal data at risk, why not just drill the darn thing out? Not so fast, says Joel Dubin. In this SearchSecurity.com Q&A, the identity management and access control expert explains some other options. Continue Reading
By -
Answer
19 Feb 2007
Can a TCP connection be made without an open port?
A company may claim it has an "application" that allows computers to communicate without opening any ports, but network security expert Mike Chapple reveals whether you should believe the hype or not. Read more in this SearchSecurity.com Q&A. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
12 Feb 2007
How should security and networking groups manage the firewall?
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should these responsibilities be split? In this expert Q&A, security management pro Shon Harris reveals how each group should contribute to the firewall management process. Continue Reading
By- Shon Harris , Logical Security
- Quiz 17 Nov 2005
- Answer 06 Feb 2003