Rev – Follow These 7 Video Conferencing Security Best Practices 3.13 3.13.12 System and Communications Protection
This article describes several video conferencing security best practices.
This article describes several video conferencing security best practices.
This sample policy provided by SANS can be customized and used to address remote access.
This SANS checklist provides a generic listing of security considerations to be used when auditing the technical aspects of a firewall.
This whitepaper from SANS discusses firewall and perimeter protections focusing on defense-in-depth.
This SANS whitepaper discusses the use of Public Key Infrastructure (PKI) to meet business, regulatory, and compliance requirements.
This SANS whitepaper describes firewall and perimeter protections.
This SANS whitepaper defines FIPS, identify FIPS approved encryption algorithms, and examine some different vendor solutions and their use of these approved algorithms.
This paper examines the vulnerabilities of VoWiFi calling, assesses what common and less well-known attacks are able to exploit those vulnerabilities, and then proposes technological or procedural security protocols to harden telephony systems against adversary exploitation.
This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem.
This SANS whitepaper discusses the need for web application firewalls.