Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Containment is essential for combating attacks

    Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage. 

  • Content filtering helps snub spyware

    ServGate partners with SurfControl adding content filtering to the company's modular multi-function security device. 

  • On security, is Cisco the next Microsoft?

    After a flood of recent security vulnerabilities, some wonder if Cisco's security track record is becoming as tarnished as Microsoft's. Though the networking giant is wearing a bigger target than ever, experts say good communication and best practice... 

  • Cisco under fire

    Since the end of March, Cisco has been forced to respond to or announce six different security flaws -- more than one a week on average. 

  • Are mobile devices opening the network perimeter?

    A Burton Group report suggests that enterprise networks -- and the data they safeguard -- may be at risk because of unsecured mobile devices. 

  • IBM and Cisco battle remote attack vulnerabilities

    Both IBM and Cisco are warning of vulnerabilities that remote attackers could exploit to cause denial of service and other problems. 

  • Teens write script to attack Cisco devices

    Cisco has provided code upgrades and mitigation suggestions for numerous vulnerabilities in key networking solutions for which exploit code already exists. 

  • Multiple Cisco products among those clobbered by OpenSSL flaw

    Cisco switches, routers and firewalls are vulnerable to attack due to a problem in OpenSSL that has other software vendors scrambling to cope. 

  • Bagle-A worm moving quickly

    The latest mass-mailing worm carries an expiration date and opens an unassigned port waiting for further instructions from its author. 

  • Intrusion detection is not dead but evolving into intrusion prevention

    The evolution of intrusion-detection technology to intrusion prevention is simultaneously converging with firewalls. This will lead to a next-generation network security gateway, but it is an evolutionary process, not a destruction of the old.