Similar Articles |
|
InternetNews January 25, 2005 Tim Gray |
McAfee Adds to Intrusion Prevention System The security vendor brings McAfee IntruShield 4010 and IntruShield 3000 into its IntruShield family. The products are designed to protect large and mission-critical networks of large-scale enterprises. |
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
InternetNews April 21, 2009 Sean Michael Kerner |
Cisco Expands Security to the Cloud Cisco claims a 100 percent improvement for its intrusion prevention system - but you still need a firewall. |
CIO September 15, 2002 D.F. Tweney |
Who's on Your Network? Intrusion detection systems can work, but they require time and money |
InternetNews May 20, 2010 |
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. |
InternetNews May 18, 2007 Sean Michael Kerner |
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. |
InternetNews June 7, 2004 Jeremy Jarrell |
ArcSight Counters Threats Unseen Current Subscriber Identity Module (SIM) technology provides protection against existing threats, but how do you combat something that isn't there? |
CIO October 30, 2012 Lucian Constantin |
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say |
PC Magazine February 1, 2008 Matthew D. Sarrel |
Unified Threat Management A single interface to protect your network makes good sense. |
InternetNews April 27, 2011 |
Russia Leads in Internet Attack Traffic New report from Akamai names Russia as the source of 10 percent of global attack traffic, but is it all really coming from Russia? |
IEEE Spectrum December 2007 Nucci & Bannerman |
Controlled Chaos We need to exploit the science of order and disorder to protect networks against coming generations of superworms. |
InternetNews December 4, 2007 Sean Michael Kerner |
New Cisco IPS Isn't All About Speed Cisco's new intrusion prevention system shuns 10 GbE but promises high-performance inspection of media and transaction threats. |
InternetNews July 28, 2010 |
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. |
InternetNews February 14, 2005 Susan Kuchinskas |
IronPort Offers Web-Based Threat Lookup E-mail security firm IronPort begins offering public report detailing latest e-mail trends and threats. |
InternetNews July 14, 2009 |
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. |
InternetNews January 4, 2008 David Needle |
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. |
Insurance & Technology August 4, 2007 Anne Rawland Gabriel |
Infinity Insurance Deploys Top Layer Networks IPS After experiencing a major outage, the insurance company implemented Top Layer Networks' Intrusion Prevention System, following recommendations from business partners. |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
InternetNews December 12, 2005 Jim Wagner |
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. |
CIO April 15, 2004 Eric Knorr |
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
Wall Street & Technology June 12, 2007 Anne Rawland Gabriel |
T. Rowe Price Adopts Intrustion-Prevention Systems From TippingPoint The investment management firm thwarts malware and pleases Sarbanes Oxley auditors with the adoption of an intrusion-prevention system from TippingPoint. |
InternetNews May 25, 2010 |
Sourcefire Ramps Up Intrusion Prevention New enhancements aim to lock down enterprise networks with better application awareness. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
PC Magazine October 1, 2004 Neil J. Rubenking |
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... |
InternetNews February 17, 2009 Sean Gallagher |
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. |
Insurance & Technology December 13, 2006 Anthony O'Donnell |
Secure Perimeter QUINN-direct decided to improve its e-commerce infrastructure in advance of a 2007 deadline. |
T.H.E. Journal February 2005 |
Product Watch - Lightspeed Firewall Lightspeed Firewall provides well-integrated, multiple levels of security to create a comprehensive firewall. |
InternetNews January 15, 2009 Richard Adhikari |
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. |
The Motley Fool December 15, 2009 Tim Beyers |
Can Akamai Save the Cloud From Itself? Akamai is already delivering Web content. Now, it wants to protect what it delivers with its Web Application Firewall, a service that hunts for and stops malicious traffic that lives in the Web's "applications layer." |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
T.H.E. Journal August 2004 |
Total Traffic Control 5.0 This updated network security software features new tools for detecting and blocking viruses, spyware, spam and inappropriate Web content. |
InternetNews January 19, 2011 |
New Type of Denial of Service Attack Emerging Researchers detail a new kind of more sophisticated DoS attack at this week's Black Hat security conference. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
InternetNews July 28, 2010 |
Sourcefire Debuts Integrated Security Tool New open source Razorback framework aims to give security professionals a unified view of the assets across the enterprise, amassing and correlating data from an array of points on the network. |
InternetNews November 1, 2010 |
Sourcefire Moves to Next-Generation Firewalls Sourcefire announced that it will expand IPS capabilities and takes aim at next-generation firewall market for 2011. |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. |
Technology Research News January 26, 2005 Kimberly Patch |
Adaptive Lights Organize Traffic A researcher in Belgium has devised a way to allow traffic lights to self-organize to improve traffic flow. The method, which taps the self-organizing principles of social insects, does away with central control. |
National Defense October 2007 Breanne Wagner |
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." |
PC Magazine August 29, 2007 Frank Washburn |
Future Watch: Traffic-Predicting Software Trying to navigate through a traffic jam can be downright nightmarish when you're late to work. |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. |
InternetNews April 8, 2008 Sean Michael Kerner |
Big Refresh For Cisco's 'Self-Defending' Network Cisco updates core security portfolio and says it's ready to take on all comers. |