Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IBM and Cisco battle remote attack vulnerabilities

    Both IBM and Cisco are warning of vulnerabilities that remote attackers could exploit to cause denial of service and other problems. 

  • Teens write script to attack Cisco devices

    Cisco has provided code upgrades and mitigation suggestions for numerous vulnerabilities in key networking solutions for which exploit code already exists. 

  • Multiple Cisco products among those clobbered by OpenSSL flaw

    Cisco switches, routers and firewalls are vulnerable to attack due to a problem in OpenSSL that has other software vendors scrambling to cope. 

  • Bagle-A worm moving quickly

    The latest mass-mailing worm carries an expiration date and opens an unassigned port waiting for further instructions from its author. 

  • Intrusion detection is not dead but evolving into intrusion prevention

    The evolution of intrusion-detection technology to intrusion prevention is simultaneously converging with firewalls. This will lead to a next-generation network security gateway, but it is an evolutionary process, not a destruction of the old. 

  • Words-to-go: Spam

    This handy printable glossary goes hand in hand with our LearnIT series on defeating spam in the enterprise. 

  • Check Point firewall serves midsized businesses

    Check Point has released a firewall for misdized businesses that offers enterprise-caliber features such as an Internet gateway and VPN. According to the company, it's well suited for smaller firms that need enhanced functionality but lack the manpow... 

  • Network management security

    Take a look at how change management can improve network security, and how wireless devices will change the way you'll secure network devices. 

  • Internet stalker

    Internet stalker/social engineering 

  • Despite security risks, analyst sees value in wireless experimentation

    Wireless technology hasn't come close to reaching its full potential, but according to an analyst who spoke at Networking Decisions, now is a smart time for IT managers to start experimenting with the technology. Though reliability and security issue...