Email Alerts
-
Network devices face unending dangers
Denial-of-service attacks, mirror points and false routing are just a few of the ways hackers can disrupt networks, but a Burton Group analyst explains how enterprises can thwart device danger. Article | 30 Jul 2004
-
Security word search answer key
Security word search answer key Article | 15 Jul 2004
-
Security word search
Test your security knowledge by having some fun with this word search and enter our contest for your chance to win a free security book. Article | 13 Jul 2004
-
Cisco's self-defending networks progress, slowly
Cisco Systems Inc. has been in the process of folding security into its network infrastructure for some time. The initiative, known as the self-defending network strategy, is a part of Cisco's overall push to add more intelligence into the network. B... Interview | 07 Jul 2004
-
Cisco Collaboration Server flaw could allow remote attacks
A flaw in Cisco's Collaboration Server could leave some enterprises open to attacks from remote users. One analyst says the vulnerability demonstrates that the networking giant's software is not up to par with the rest of the industry. Article | 01 Jul 2004
-
Containment is essential for combating attacks
Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage. Article | 16 Jun 2004
-
Content filtering helps snub spyware
ServGate partners with SurfControl adding content filtering to the company's modular multi-function security device. Article | 15 Jun 2004
-
On security, is Cisco the next Microsoft?
After a flood of recent security vulnerabilities, some wonder if Cisco's security track record is becoming as tarnished as Microsoft's. Though the networking giant is wearing a bigger target than ever, experts say good communication and best practice... Article | 10 May 2004
-
Cisco under fire
Since the end of March, Cisco has been forced to respond to or announce six different security flaws -- more than one a week on average. Article | 26 Apr 2004
-
Are mobile devices opening the network perimeter?
A Burton Group report suggests that enterprise networks -- and the data they safeguard -- may be at risk because of unsecured mobile devices. Article | 19 Apr 2004
Network Management Strategies for the CIO