New & Notable
Network Intrusion Detection and Analysis News
February 28, 2012
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.
Network Intrusion Detection and Analysis Get Started
Bring yourself up to speed with our introductory content
Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down. Continue Reading
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Continue Reading
Evaluate Network Intrusion Detection and Analysis Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The information security industry needs to shift its focus to data-driven security. Continue Reading
In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape. Continue Reading
Readers choose the best intrusion detection/prevention products. Continue Reading
Problem Solve Network Intrusion Detection and Analysis Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility. Continue Reading
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan. Continue Reading
A few simple security best practices may have spared security company HBGary Federal from the recent attack by the hacktivist group Anonymous. Nick Lewis explains what happened and how to prevent such an attack against your company. Continue Reading