Network Device Management
- July 30, 2015
Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?
- June 05, 2015
News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?
- May 11, 2015
Intel Security wants to offer a full set of security products, but believes highest value may come from being a bridge. Security Connected aims to integrate non-Intel products and place Intel at the center, although experts worry about complexity.
- January 28, 2015
An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.
- January 16, 2015
News roundup: Recently discovered firmware flaws highlight the challenges posed by hardware security. Plus: Heartland's breach warranty; RSA's overhaul; and Download.com's app (in)security.
- November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
- April 16, 2013
SSH Communications Security will offer a free tool for auditing SSH key use within large organizations at next week's Infosecurity Europe conference.
- November 27, 2012
Hard-coded passwords on some Samsung and Dell printers could enable an attacker to take control of an affected device.
- November 30, 2011
Researchers at Columbia University have discovered a vulnerability in HP’s LaserJet printers that could allow attackers to gain complete remote control.
- February 15, 2011
Many network security professionals take the wrong approach when testing their networks, according to one prominent security expert.
- July 28, 2010
While the vendors have released patches, SecureWorks researchers told Black Hat 2010 attendees that many enterprises place too much trust in their security systems and fail to check them for basic vulnerabilities.
- October 28, 2009
Columbia University researchers found thousands of devices, from home routers to video conferencing units at risk. They say their research has implications for enterprises.
- April 22, 2009
Technologists say security information and event management success depends not on the product, but on the risk and information management program implemented with it. Also, small businesses lack the resources to get much value from SIEM systems.
- December 02, 2008
IxDefend from Ixia addresses network device and application flaws by fuzzing them to expose flaws and trigger problems.
- November 06, 2008
Nielsen Mobile uses Altor Networks' security analyzer to gain insight into virtual network activity