Network Security Monitoring and Analysis

  • February 15, 2007 15 Feb'07

    'Hacking for Dummies' giveaway contest

    Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver.

  • February 15, 2007 15 Feb'07

    Network hacking for dummies: Not just for dummies anymore

    Network security is achievable if network pros gain control and test their systems, says author Kevin Beaver in his new book Hacking For Dummies, 2nd Edition.

  • January 10, 2007 10 Jan'07

    Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.

  • November 29, 2006 29 Nov'06

    Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats.

  • September 07, 2006 07 Sep'06

    Cisco, SAP team-up marries network with risk management

    Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals.

  • August 22, 2006 22 Aug'06

    Network visibility thwarts crime, identifies unwanted traffic

    Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters.

  • August 09, 2006 09 Aug'06

    Network Defenders

    The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users...

  • May 04, 2006 04 May'06

    Security is the name of the game at Interop

    Messaging security was a hot Interop topic, rivaled only by every other aspect of security. Vendors rolled out wares to protect messaging systems and other points on the network.

  • May 01, 2006 01 May'06

    Wireless trespasser stopped dead in his tracks

    A security expert working at a California government office spotted an unauthorized person trying to bridge onto the wired network through a wireless NIC card. He put a stop to it.

  • April 24, 2006 24 Apr'06

    Gartner underscores five overblown threats

    Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies.

  • April 10, 2006 10 Apr'06

    Auditor's office wards off potential wireless threats

    Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly.

  • March 28, 2006 28 Mar'06

    Data theft prompts firm to lock down, protect network

    After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network core or perimeter.

  • March 07, 2006 07 Mar'06

    Public security slip forces Georgia Capitol to lock down WLAN

    More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless.

  • March 01, 2006 01 Mar'06

    Monitoring goes out-of-band

    A new data access switch from Gigamon boosts the number of SPAN ports on the network for out-of-band monitoring.

  • February 28, 2006 28 Feb'06

    Endpoint security threats meet their match

    Securing the network at every endpoint is changing with some new products that limit, prohibit and protect endpoints and users.