These postings are provided "AS IS" with no warranties, and confers no rights. You assume all risk for your use.
Anthony Bartolo Twitter | LinkedIn
Stephen IbarakiIndustry AnalystFCIPS, I.S.P., ITCP/IP3P, DFNPA, CNP, FGITCA, MVP
I was talking with Laura Chappell about useful security tips since she "lives and breathes" security. As a bit of background, last year, she received the international Award for Professionalism founded by the NPA and given out at the Interop Conference in Vegas. Some of you may have caught her packed sessions at Microsoft TechEd conferences or HP Enterprise Symposiums. I know from my talks with some of you, you are familiar with her "Internet Safety for Kids Project" which she founded together with the "Protocol Analysis Institute."
Anyways, I asked her about the best ways to perform a security vulnerability audit on your network and she provided this list:
***Well, Stephen, there are so many ways to go about this so I'll just start spewing out options:
Laura shares more of her best practices and provides her viewpoint on security in an upcoming interview. Look for it here...
Thank you,Stephen Ibaraki