Email Alerts
-
Wireless trespasser stopped dead in his tracks
A security expert working at a California government office spotted an unauthorized person trying to bridge onto the wired network through a wireless NIC card. He put a stop to it. Article | 01 May 2006
-
Gartner underscores five overblown threats
Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies. Article | 24 Apr 2006
-
Auditor's office wards off potential wireless threats
Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly. Article | 10 Apr 2006
-
Data theft prompts firm to lock down, protect network
After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network core or perimeter. Article | 28 Mar 2006
-
Public security slip forces Georgia Capitol to lock down WLAN
More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless. Article | 07 Mar 2006
-
Monitoring goes out-of-band
A new data access switch from Gigamon boosts the number of SPAN ports on the network for out-of-band monitoring. Article | 01 Mar 2006
-
Endpoint security threats meet their match
Securing the network at every endpoint is changing with some new products that limit, prohibit and protect endpoints and users. Article | 28 Feb 2006
-
Cisco unveils steps toward self-defending network
In his keynote, CEO John Chambers touted product enhancements that advance his push for networks that can defend themselves without human intervention. Article | 16 Feb 2006
-
Flood of NAC products toughens security decisions
The continuing flood of network access control products is forcing networking pros to weigh all of the options before securing their networks. Article | 15 Feb 2006
-
IM threats grow, response lags
Reports from IMlogic and Akonix show that IM threats are growing while IT shops are behind in their preparedness. In fact, many firms are still totally unaware of just how much danger actually exists. Article | 03 Feb 2006
Network Management Strategies for the CIO