Virtual Private Network Security news, help and research - SearchSecurity.co.UK
  • Expert calls SSL protocol vulnerability a non issue

    The researchers who discovered the SSL vulnerability warn that it could have far reaching affects and are working with a consortium of vendors to coordinate an industry-wide fix.

  • DNSSEC deployment challenges can be overcome

    DNSSEC isn't a cure-all for DNS security issues. It won't stop drive-by attacks, protect against denial-of-service attacks or any other kind of attacks that piggyback on top of the DNS and depend u...

  • How to integrate the security of both physical and virt

    According to a recent Gartner Inc. research report, 60% of virtual machines will be less secure than their physical counterparts through 2009. Michael Cobb explores the challenges of securing a mix...

  • How to patch Kaminsky's DNS vulnerability

    When Dan Kaminsky revealed the details of his recently discovered DNS flaw at this year's Black Hat briefings in Las Vegas, it confirmed what many in the security community already feared: that it ...

Virtual Private Network Security

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies. 

  • Network Access Control Learning Guide

    From PDAs to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the network. Learn how to block and secure untrusted endpoints, and control user access with this Learning Guide. 

  • RSA Conference 2006

    Can't make it to RSA 2006? Check out our continuous coverage from the show floor. 

  • A pen tester’s perspective on creating a secure password

    A pen tester explains the importance of creating a secure password 

  • How to integrate the security of both physical and virtual machines

    According to a recent Gartner Inc. research report, 60% of virtual machines will be less secure than their physical counterparts through 2009. Michael Cobb explores the challenges of securing a mixed infrastructure of physical and virtual machines. 

  • How to patch Kaminsky's DNS vulnerability

    When Dan Kaminsky revealed the details of his recently discovered DNS flaw at this year's Black Hat briefings in Las Vegas, it confirmed what many in the security community already feared: that it was one of the most important discoveries in years, a... 

  • Split-tunnel VPNs: Susceptible to Trojans?

    The beauty of split tunneling is that an enterprise doesn't need to provide the general Internet access point for a VPN user. Mike Chapple, however, also explains why split-tunnel VPNs provide a false sense of security. 

  • Secure remote access: Closing the Windows Mobile Smartphone loophole

    After years of waiting, smartphones are finally being used to access corporate networks. But security programs for Windows laptops won't run as-is on Windows Mobile devices, leading users to engage in risky behavior. In this tip, Core Competence's Li... 

  • Bringing the network perimeter back from the "dead"

    In the past year, a number of security professionals from consulting firms have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, offers network security expert Mike Chapple. In this spirited ti... 

  • How Juniper and F5 SSL VPNs can handle endpoint security

    It's not easy setting up an endpoint security system, especially when using an existing SSL VPN architecture. In this tip, expert David Strom uses words and pictures to illustrate the steps needed to enable endpoint security using the SSL VPNs from J... 

  • Four ways to isolate sensitive servers

    When the security issue arises, a discussion of isolating a sensitive server usually follows. While often impractical, learn four ways to isolate sensitive servers if the need becomes a necessity. 

  • Pen testing your VPN

    Your VPN is a vital gateway into your network for your company's road warriors, telecommuters and other remote users. Unfortunately, it's also a gateway for the less-than-scrupulous predators prowling the Internet for access to your network. This tip... 

  • 2006 Products of the Year: Remote access

    Information Security magazine and SearchSecurity.com surveyed their readers to identify the best products of 2006. Here are your choices for remote access solutions. 

  • See more Tips on Virtual Private Network Security
About Virtual Private Network Security

Get expert advice on virtual private network (VPN) security, including tips on how to secure remote access with IPSec or SSL VPNs and information on VPN software and connections.