Email Alerts
-
New filter sinks phishing expeditions
A new anti-phishing filter from TippingPoint Technologies Inc. uses multiple layers to block sneaky scams at the network level. Article | 12 Oct 2005
-
Cisco adds new layers to network defense
The network giant is teaming up with Trend Micro to help companies keep worm and virus outbreaks at bay and is augmenting internal network security with new software. Article | 27 Sep 2005
-
'Serious' security holes in Linksys router
The wireless router has five flaws attackers could use to tamper with passwords and firewalls, install firmware and cause a denial of service. Article | 14 Sep 2005
-
Time to throw all your security in one box?
A survey shows more IT shops are considering multi-purpose security appliances. But it still may not be wise to stuff all your vendors in one box. Article | 31 Aug 2005
-
Networking giant sets site on security intelligence
In search of security information that minimizes network disruptions and optimizes product threat mitigation? Cisco may have a site for sore eyes. Article | 29 Aug 2005
-
A layered approach to network security
With network threats on the rise, one company is using a layered approach -- antivirus, antispyware and special QoS devices -- to ward off outbreaks like Zotob. Article | 23 Aug 2005
-
Network devices simplifying integration, Web services security
Cisco's planned foray into application-oriented networking helps elevate the work of the early pioneers. Article | 12 Jul 2005
-
How to survive a hurricane
During a widespread emergency, such as a hurricane, backup hot sites fill up and there is nowhere to go. Experienced data center managers ride out the storm by planning backup for their backup. Article | 12 Jul 2005
-
Security's evolution puts network pros at crossroads
Networking vendors are pushing deeper into security, but do they have the expertise? Experts weigh in on where enterprises should turn for network security. Article | 15 Jun 2005
-
Networking vendors wrap themselves in security
Cisco, Juniper and 3Com have used recent acquisitions to make landmark moves into the security market, and their efforts are blurring the line between networking and security. Article | 14 Jun 2005
Network Management Strategies for the CIO