Continuous security monitoring: Learning from the Feds

Monitoring Network Traffic and Network Forensics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security Bytes: More flaws in Mac OS X

    In other news: Financial firms scramble over massive online heist, Symantec warns of Scan Engine flaws and a new Snort-based tool is unveiled. 

  • Network tool stops security threats dead in their tracks

    One vendor's new security analyzer tool puts developing products through a vulnerability torture chamber to identify zero-day threats. 

  • Attacks driven by love of money

    Symantec's latest threat report shows digital desperadoes are exploiting Web application flaws and using "modular" malcode to launch lucrative attacks. 

  • Information security, 'CSI' style

    A consultant to the FBI and Scotland Yard says cybersecurity professionals better be careful when they react to a network intrusion, lest they inadvertently let the crooks escape. 

  • How to protect your network from the Plug and Play exploits

    Security experts offer practical advice to reduce the risk of your company's networks being infected by a variety of malicious code now circulating. 

  • Zombie machines used in 'brutal' SSH attacks

    IT managers use SSH to gain secure access to remote computers. Hackers are using it to crack your network, with help from their zombie friends. 

  • Forensics: Electronic evidence makes its mark in investigations

    Computer forensics offers a surprising amount of help to investigators. 

  • Nessus no longer free

    Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development. 

  • Countdown begins for Mydoom DDoS attacks

    Beginning Sunday, machines infected by the Mydoom-A worm are expected to unite in a distributed denial-of-service attack on the SCO Group's Web site. 

  • Employee monitoring: Is Big Brother a bad idea?

    Employee monitoring can help protect intellectual property and keep an eye on employee activities, if it's done properly. What are some of the most common mistakes of monitoring? Why should companies employ a monitoring plan? In this interview, Searc...