Email Alerts
-
New filter sinks phishing expeditions
A new anti-phishing filter from TippingPoint Technologies Inc. uses multiple layers to block sneaky scams at the network level. Article
-
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same.... Tip
-
Avoiding open relays
Getting on a spam blacklist can cause an annoying and crippling e-mail outage. One of the keys to staying off blacklists is making sure your e-mail system doesn't turn into an open relay. Tom Lancaster shows you how in this tip. Tip
-
Cisco adds new layers to network defense
The network giant is teaming up with Trend Micro to help companies keep worm and virus outbreaks at bay and is augmenting internal network security with new software. Article
-
The network administrator's guide to forensic first response
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the inv... Tip
-
blended threat
A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion. Definition
-
How would an 'unwanted visitor' create diagrams of a network identifying security checkpoints?
Ask the Expert
-
Which transmission media are the most secure and the least secure?
Ask the Expert
-
How do I remove Trojan viruses that have infected my network?
Ask the Expert
-
Catching illegal VoIP
Ask the Expert
Network Management Strategies for the CIO