Email Alerts
-
Network forensics tools increasingly aid security response teams
As malware continues to evade signature-based antivirus and intrusion prevention systems some organizations are turning to network capturing and analysis tools to detect anomalies and respond to security threats as they happen. One such vendor, Hernd... Interview | 02 Jun 2010
-
For enterprise firewalls, performance outweighs security functionality
Some network administrators fear too many security features can cause bottlenecks, slowing the network or worse, shutting it down altogether. Article | 04 May 2010
-
Private sector can take lessons from federal network security projects
Ongoing network security initiatives at the federal level, including the Trusted Internet Connections program and the Einstein project are helping provide a roadmap for the private sector, according to a network security expert. Michael Markulec, chi... Interview | 27 Apr 2010
-
Major ISPs can remove botnets, malware, CISO says
Internet service providers have the ability to wipe nearly all malicious activity in their networks without stepping on individual privacy and civil liberties, says network security expert Adam Rice of Tata Communications Ltd. Rice, chief security of... Interview | 17 Mar 2010
-
Botnet masters turn to Google, social networks to avoid detection
Cybercriminals turn to cloud computing to feed commands to the throngs of zombie computers under their control and avoid detection. Article | 10 Nov 2009
-
Researchers find thousands of flawed embedded devices
Columbia University researchers found thousands of devices, from home routers to video conferencing units at risk. They say their research has implications for enterprises. Article | 28 Oct 2009
-
Network traffic collection, analysis helps prevent data breaches
Government agencies were among the first to retain mountains of network traffic data, but large banks, financial firms and healthcare companies are following in an effort to respond to alerts generated by intrusion defense systems and speed digital f... Interview | 19 Oct 2009
-
DoD urges less network anonymity, more PKI use
U.S. Department of Defense CISO Robert Lentz went down a laundry list of security technologies needed to protect both private and government networks from cybercriminals. The age of anonymity on networks needs to come to a close to improve national c... Article | 30 Jul 2009
-
Cyberattack mapping could alter security defense strategy
Sandia researcher presents cyberattack maps and new security method to boost network defenses. Article | 10 Mar 2009
-
Ixia network security tool exposes problems
IxDefend from Ixia addresses network device and application flaws by fuzzing them to expose flaws and trigger problems. Article | 02 Dec 2008
Security Management Strategies for the CIO