Network Security Monitoring and Analysis
- February 15, 2007
Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver.
- February 15, 2007
Network security is achievable if network pros gain control and test their systems, says author Kevin Beaver in his new book Hacking For Dummies, 2nd Edition.
- January 10, 2007
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.
- November 29, 2006
When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats.
- September 07, 2006
Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals.
- August 22, 2006
Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters.
- August 09, 2006
The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users...
- May 04, 2006
Messaging security was a hot Interop topic, rivaled only by every other aspect of security. Vendors rolled out wares to protect messaging systems and other points on the network.
- May 01, 2006
A security expert working at a California government office spotted an unauthorized person trying to bridge onto the wired network through a wireless NIC card. He put a stop to it.
- April 24, 2006
Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies.
- April 10, 2006
Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly.
- March 28, 2006
After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network core or perimeter.
- March 07, 2006
More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless.
- March 01, 2006
A new data access switch from Gigamon boosts the number of SPAN ports on the network for out-of-band monitoring.
- February 28, 2006
Securing the network at every endpoint is changing with some new products that limit, prohibit and protect endpoints and users.