Network Security Monitoring and Analysis

  • June 16, 2004 16 Jun'04

    Containment is essential for combating attacks

    Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage.

  • June 15, 2004 15 Jun'04

    Content filtering helps snub spyware

    ServGate partners with SurfControl adding content filtering to the company's modular multi-function security device.

  • May 10, 2004 10 May'04

    On security, is Cisco the next Microsoft?

    After a flood of recent security vulnerabilities, some wonder if Cisco's security track record is becoming as tarnished as Microsoft's. Though the networking giant is wearing a bigger target than ever, experts say good communication and best ...

  • April 26, 2004 26 Apr'04

    Cisco under fire

    Since the end of March, Cisco has been forced to respond to or announce six different security flaws -- more than one a week on average.

  • April 19, 2004 19 Apr'04

    Are mobile devices opening the network perimeter?

    A Burton Group report suggests that enterprise networks -- and the data they safeguard -- may be at risk because of unsecured mobile devices.

  • April 12, 2004 12 Apr'04

    IBM and Cisco battle remote attack vulnerabilities

    Both IBM and Cisco are warning of vulnerabilities that remote attackers could exploit to cause denial of service and other problems.

  • March 30, 2004 30 Mar'04

    Teens write script to attack Cisco devices

    Cisco has provided code upgrades and mitigation suggestions for numerous vulnerabilities in key networking solutions for which exploit code already exists.

  • March 18, 2004 18 Mar'04

    Multiple Cisco products among those clobbered by OpenSSL flaw

    Cisco switches, routers and firewalls are vulnerable to attack due to a problem in OpenSSL that has other software vendors scrambling to cope.

  • November 20, 2003 20 Nov'03

    Intrusion detection is not dead but evolving into intrusion prevention

    The evolution of intrusion-detection technology to intrusion prevention is simultaneously converging with firewalls. This will lead to a next-generation network security gateway, but it is an evolutionary process, not a destruction of the old.

  • October 29, 2003 29 Oct'03

    Words-to-go: Spam

    This handy printable glossary goes hand in hand with our LearnIT series on defeating spam in the enterprise.

  • August 21, 2003 21 Aug'03

    Check Point firewall serves midsized businesses

    Check Point has released a firewall for misdized businesses that offers enterprise-caliber features such as an Internet gateway and VPN. According to the company, it's well suited for smaller firms that need enhanced functionality but lack the ...

  • August 21, 2003 21 Aug'03

    Network management security

    Take a look at how change management can improve network security, and how wireless devices will change the way you'll secure network devices.

  • November 19, 2002 19 Nov'02

    How to identify an internet stalker

    Internet stalker/social engineering

  • October 17, 2002 17 Oct'02

    Despite security risks, analyst sees value in wireless experimentation

    Wireless technology hasn't come close to reaching its full potential, but according to an analyst who spoke at Networking Decisions, now is a smart time for IT managers to start experimenting with the technology. Though reliability and security ...

  • September 20, 2002 20 Sep'02

    Line between networking, security ops becoming blurred

    Line between networking, security ops becoming blurred.