Security Boulevard – Endpoint and network segmentation best practices 3.13 3.13.5 System and Communications Protection
This article speaks to the deficiencies in current network segmentation for the endpoint and network segmentation best practices.
This article speaks to the deficiencies in current network segmentation for the endpoint and network segmentation best practices.
This policy from The State University of New York at Oneonta provides sample guidelines for VPN access.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of processes acting on behalf of prior users/roles) from being available to any current users/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems.
This blog post discusses some of the web browser security settings options.
This article offers some simple tips on securing email from both administrative and end user perspectives.
This sample policy defines the essential rules regarding the management and maintenance of firewalls at Texas Wesleyan.
This article focuses on key aspects of VoIP security monitoring and management.
Trend Micro’s Deep Security Help Center
This site provides a listing of Web Content Filtering solutions. WCF solutions comprise appliances and software for censoring or preventing access to restricted web content deemed offensive or inappropriate.
This is UC Berkley’s secure device configuration guideline with adherence to their security policy mandate. This is an example of a how to assess a secure configuration.