-
Block and reroute denial-of-service attacks
Prevent denial-of-service and distributed denial-of-service attacks from taking down your network by blocking and rerouting DDoS and DoS traffic using honeypots, subnets and intrusion detection and...31 Oct 2005
-
More enterprises admit to intrusions, lack of best practices
A new survey says the computing systems of one in four medium or large companies have been compromised, and yet only half have taken standard precautions to prevent attacks.31 Oct 2005
-
Securing Web apps against authenticated users
Improve Web site security by securing Web applications from authenticated users and avoiding client-side authentication.31 Oct 2005
-
What is spyware? Industry group has an answer.
The Anti-Spyware Coalition has released a set of guidelines to help vendors determine what should be blocked and what maybe is allowed.31 Oct 2005
-
Bots in the A/C, spyware in the 'fridge
Someday, hackers will target the computers in your air conditioner, refrigerator and TV. What can security professionals do about it?31 Oct 2005
-
worm
In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.30 Oct 2005
-
U.S. Postal Service delivers intrusion prevention
Security Seven award winner Charles McGann discusses how the USPS successfully applied intrusion prevention solutions across their enterprise and how you can do so across your own.28 Oct 2005
-
Perfecting the security policy process
Phebe Waterfield, Security Analyst, Yankee Group discusses tactics for perfecting the security policy process in this presentation from Information Security Decisions.28 Oct 2005
-
IPsec and SSL VPNs: Solving remote access problems
Learn how to solve remote access problems in this Information Security Decisions presentation by security expert Joel Snyder.27 Oct 2005
-
Antispyware: SurfControl's Enterprise Threat Shield 3.0
SurfControl's Enterprise Threat Shield 3.027 Oct 2005
-
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.27 Oct 2005
-
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.527 Oct 2005
-
Firewall VPN
ZyXEL Communication's ZyWALL P127 Oct 2005
-
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite27 Oct 2005
-
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.127 Oct 2005
-
7 steps to safeguard enterprise e-mail
Joel Snyder provides tactics enterprises can use to maintain an effective and secure e-mail system in this presentation from Information Security Decisions.27 Oct 2005
-
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.27 Oct 2005
-
Editor's Desk: An email security guide for managers
Knights of Spamalot27 Oct 2005
-
Ping: Katrina's Security Survivors
Katrina's Security Survivors27 Oct 2005
-
Layer 8: SOX security spending is an old, wrinkled tactic
Darned SOX27 Oct 2005
Security Management Strategies for the CIO