Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Officials: Cisco theft was part of a much bigger attack

    Last year's IOS source code theft from Cisco was huge in itself, but authorities now believe it was one element of a much larger cyberheist. 

  • IOS theft highlights need to patch flaws quickly

    It's unclear whether future exploits resulting from last year's Cisco IOS source code theft will eventually disrupt networks worldwide, but experts agree that any IOS-related flaws must be patched quickly. 

  • Do blended threats call for all-in-one or best-of-breed devices?

    Interop 2005 speakers say a single, comprehensive security device is the remedy for thwarting blended security threats, but others disagree. 

  • SurfControl rides Internet filtering wave

    3Com and SurfControl are helping enterprises enact appropriate Web usage policies and block dangerous or inappropriate content, part of a growing trend to use the network to thwart malicious content. 

  • Gartner forecasts challenges for Cisco

    Cisco Systems Inc.'s second-quarter profit almost doubled, but shares fell as sales missed analysts' estimates. Is it a minor bump in the road for the networking giant, or a sign of struggles to come?

    Rachna Ahlawat, principal analyst with the St... 

  • A successful antispam team begins with a plan

    There are dozens of spam-fighting solutions available. The bigger issue is how to equip your staff with the knowledge to effectively use these tools. 

  • New Cisco security strategy targets elusive threats

    Cisco has unveiled a new line of security products to fight against elusive network threats such as phishing, viruses and denial-of-service attacks. Experts laud the moves, but explain why hackers aren't exactly running for cover. 

  • Mounting IOS flaws may boost third-party vendors

    A spate of recently discovered security vulnerabilities in the software that runs Cisco's routers and switches has caught the industry's eye, but one expert explains why, for some, IOS flaws could be an opportunity. 

  • Chapter of the Week - February 2005

    This month we present you with chapter excerpts focusing on network security 

  • Sunbelt shines light on vulnerability assessment

    A well-known distributor is transitioning into the security products market, proving that enterprise interest in vulnerability assessment products is only increasing.