MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 25, 2005
Tim Gray
McAfee Adds to Intrusion Prevention System The security vendor brings McAfee IntruShield 4010 and IntruShield 3000 into its IntruShield family. The products are designed to protect large and mission-critical networks of large-scale enterprises. mark for My Articles similar articles
CIO
June 15, 2003
Dylan Tweney
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. mark for My Articles similar articles
InternetNews
April 21, 2009
Sean Michael Kerner
Cisco Expands Security to the Cloud Cisco claims a 100 percent improvement for its intrusion prevention system - but you still need a firewall. mark for My Articles similar articles
CIO
September 15, 2002
D.F. Tweney
Who's on Your Network? Intrusion detection systems can work, but they require time and money mark for My Articles similar articles
InternetNews
May 20, 2010
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware. mark for My Articles similar articles
InternetNews
May 18, 2007
Sean Michael Kerner
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. mark for My Articles similar articles
InternetNews
June 7, 2004
Jeremy Jarrell
ArcSight Counters Threats Unseen Current Subscriber Identity Module (SIM) technology provides protection against existing threats, but how do you combat something that isn't there? mark for My Articles similar articles
CIO
October 30, 2012
Lucian Constantin
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say mark for My Articles similar articles
PC Magazine
February 1, 2008
Matthew D. Sarrel
Unified Threat Management A single interface to protect your network makes good sense. mark for My Articles similar articles
InternetNews
April 27, 2011
Russia Leads in Internet Attack Traffic New report from Akamai names Russia as the source of 10 percent of global attack traffic, but is it all really coming from Russia? mark for My Articles similar articles
IEEE Spectrum
December 2007
Nucci & Bannerman
Controlled Chaos We need to exploit the science of order and disorder to protect networks against coming generations of superworms. mark for My Articles similar articles
InternetNews
December 4, 2007
Sean Michael Kerner
New Cisco IPS Isn't All About Speed Cisco's new intrusion prevention system shuns 10 GbE but promises high-performance inspection of media and transaction threats. mark for My Articles similar articles
InternetNews
July 28, 2010
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. mark for My Articles similar articles
InternetNews
February 14, 2005
Susan Kuchinskas
IronPort Offers Web-Based Threat Lookup E-mail security firm IronPort begins offering public report detailing latest e-mail trends and threats. mark for My Articles similar articles
InternetNews
July 14, 2009
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. mark for My Articles similar articles
InternetNews
January 4, 2008
David Needle
Wi-Fi Networks Face Virus Threat? Unprotected routers could spread malicious software rapidly to thousands of computers. mark for My Articles similar articles
Insurance & Technology
August 4, 2007
Anne Rawland Gabriel
Infinity Insurance Deploys Top Layer Networks IPS After experiencing a major outage, the insurance company implemented Top Layer Networks' Intrusion Prevention System, following recommendations from business partners. mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
InternetNews
December 12, 2005
Jim Wagner
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
Wall Street & Technology
June 12, 2007
Anne Rawland Gabriel
T. Rowe Price Adopts Intrustion-Prevention Systems From TippingPoint The investment management firm thwarts malware and pleases Sarbanes Oxley auditors with the adoption of an intrusion-prevention system from TippingPoint. mark for My Articles similar articles
InternetNews
May 25, 2010
Sourcefire Ramps Up Intrusion Prevention New enhancements aim to lock down enterprise networks with better application awareness. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
InternetNews
June 11, 2009
Alex Goldman
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
InternetNews
February 17, 2009
Sean Gallagher
Social Networks a Magnet for Malware Just like the crooks robbed the banks because that's where the money is, malware will go where the people are. mark for My Articles similar articles
Insurance & Technology
December 13, 2006
Anthony O'Donnell
Secure Perimeter QUINN-direct decided to improve its e-commerce infrastructure in advance of a 2007 deadline. mark for My Articles similar articles
T.H.E. Journal
February 2005
Product Watch - Lightspeed Firewall Lightspeed Firewall provides well-integrated, multiple levels of security to create a comprehensive firewall. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. mark for My Articles similar articles
The Motley Fool
December 15, 2009
Tim Beyers
Can Akamai Save the Cloud From Itself? Akamai is already delivering Web content. Now, it wants to protect what it delivers with its Web Application Firewall, a service that hunts for and stops malicious traffic that lives in the Web's "applications layer." mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
PC World
May 23, 2001
Frank Thorsberg
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... mark for My Articles similar articles
T.H.E. Journal
August 2004
Total Traffic Control 5.0 This updated network security software features new tools for detecting and blocking viruses, spyware, spam and inappropriate Web content. mark for My Articles similar articles
InternetNews
January 19, 2011
New Type of Denial of Service Attack Emerging Researchers detail a new kind of more sophisticated DoS attack at this week's Black Hat security conference. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
InternetNews
July 28, 2010
Sourcefire Debuts Integrated Security Tool New open source Razorback framework aims to give security professionals a unified view of the assets across the enterprise, amassing and correlating data from an array of points on the network. mark for My Articles similar articles
InternetNews
November 1, 2010
Sourcefire Moves to Next-Generation Firewalls Sourcefire announced that it will expand IPS capabilities and takes aim at next-generation firewall market for 2011. mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles
Technology Research News
January 26, 2005
Kimberly Patch
Adaptive Lights Organize Traffic A researcher in Belgium has devised a way to allow traffic lights to self-organize to improve traffic flow. The method, which taps the self-organizing principles of social insects, does away with central control. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." mark for My Articles similar articles
PC Magazine
August 29, 2007
Frank Washburn
Future Watch: Traffic-Predicting Software Trying to navigate through a traffic jam can be downright nightmarish when you're late to work. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Larry Tabb
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
InternetNews
April 8, 2008
Sean Michael Kerner
Big Refresh For Cisco's 'Self-Defending' Network Cisco updates core security portfolio and says it's ready to take on all comers. mark for My Articles similar articles