Network Security Monitoring and Analysis
- June 16, 2004
Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage.
- June 15, 2004
ServGate partners with SurfControl adding content filtering to the company's modular multi-function security device.
- May 10, 2004
After a flood of recent security vulnerabilities, some wonder if Cisco's security track record is becoming as tarnished as Microsoft's. Though the networking giant is wearing a bigger target than ever, experts say good communication and best ...
- April 26, 2004
Since the end of March, Cisco has been forced to respond to or announce six different security flaws -- more than one a week on average.
- April 19, 2004
A Burton Group report suggests that enterprise networks -- and the data they safeguard -- may be at risk because of unsecured mobile devices.
- April 12, 2004
Both IBM and Cisco are warning of vulnerabilities that remote attackers could exploit to cause denial of service and other problems.
- March 30, 2004
Cisco has provided code upgrades and mitigation suggestions for numerous vulnerabilities in key networking solutions for which exploit code already exists.
- March 18, 2004
Cisco switches, routers and firewalls are vulnerable to attack due to a problem in OpenSSL that has other software vendors scrambling to cope.
- November 20, 2003
The evolution of intrusion-detection technology to intrusion prevention is simultaneously converging with firewalls. This will lead to a next-generation network security gateway, but it is an evolutionary process, not a destruction of the old.
- October 29, 2003
This handy printable glossary goes hand in hand with our LearnIT series on defeating spam in the enterprise.
- August 21, 2003
Check Point has released a firewall for misdized businesses that offers enterprise-caliber features such as an Internet gateway and VPN. According to the company, it's well suited for smaller firms that need enhanced functionality but lack the ...
- August 21, 2003
Take a look at how change management can improve network security, and how wireless devices will change the way you'll secure network devices.
- November 19, 2002
Internet stalker/social engineering
- October 17, 2002
Wireless technology hasn't come close to reaching its full potential, but according to an analyst who spoke at Networking Decisions, now is a smart time for IT managers to start experimenting with the technology. Though reliability and security ...
- September 20, 2002
Line between networking, security ops becoming blurred.