Email Alerts
-
Containment is essential for combating attacks
Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage. Article | 16 Jun 2004
-
Content filtering helps snub spyware
ServGate partners with SurfControl adding content filtering to the company's modular multi-function security device. Article | 15 Jun 2004
-
On security, is Cisco the next Microsoft?
After a flood of recent security vulnerabilities, some wonder if Cisco's security track record is becoming as tarnished as Microsoft's. Though the networking giant is wearing a bigger target than ever, experts say good communication and best practice... Article | 10 May 2004
-
Cisco under fire
Since the end of March, Cisco has been forced to respond to or announce six different security flaws -- more than one a week on average. Article | 26 Apr 2004
-
Are mobile devices opening the network perimeter?
A Burton Group report suggests that enterprise networks -- and the data they safeguard -- may be at risk because of unsecured mobile devices. Article | 19 Apr 2004
-
IBM and Cisco battle remote attack vulnerabilities
Both IBM and Cisco are warning of vulnerabilities that remote attackers could exploit to cause denial of service and other problems. Article | 12 Apr 2004
-
Teens write script to attack Cisco devices
Cisco has provided code upgrades and mitigation suggestions for numerous vulnerabilities in key networking solutions for which exploit code already exists. Article | 30 Mar 2004
-
Multiple Cisco products among those clobbered by OpenSSL flaw
Cisco switches, routers and firewalls are vulnerable to attack due to a problem in OpenSSL that has other software vendors scrambling to cope. Article | 18 Mar 2004
-
Bagle-A worm moving quickly
The latest mass-mailing worm carries an expiration date and opens an unassigned port waiting for further instructions from its author. News | 19 Jan 2004
-
Intrusion detection is not dead but evolving into intrusion prevention
The evolution of intrusion-detection technology to intrusion prevention is simultaneously converging with firewalls. This will lead to a next-generation network security gateway, but it is an evolutionary process, not a destruction of the old. Article | 20 Nov 2003
Network Management Strategies for the CIO