Email Alerts
-
What reporting tools are available for an enterprise IDS?
Modern security analysts can easily become overwhelmed by the variety and quantity of audit records. In this SearchSecurity.com Q&A, network expert Mike Chapple reveals which open-source reporting tools can make life easier. Ask the Expert
-
Can IBM's SMash technology secure Web applications?
The idea of mashups -- browser-based applications built by non-technical users cutting and pasting snippets of code pulled from multiple sources -- is bound to seem very frightening. Michael Cobb explores IBM's recent initiative: SMash. Ask the Expert
-
Best practices for IDS creation and signature database maintenance
Mike Chapple offers an alternative to creating an intrusion detection system as well as advice on maintaining a signature database. Ask the Expert
-
Will Cisco's plan to open access to the IOS improve network security?
If Cisco's initiative pans out, we're likely to see a number of new network management tools that integrate with IOS. Mike Chapple explains why that centralization will be a security improvement. Ask the Expert
-
How secure is a mobile phone platform with an open source framework?
Google's open source approach to mobile platform development has the potential to open up what has been until now a closed industry. Application expert Michael Cobb gives his early thoughts on Google's Android mobile phone. Ask the Expert
-
Should enterprises use open source productivity suites?
Many IT administrators remain wary of open source software, often citing its lack of any warranty protection. Expert Michael Cobb explains why enterprise pros shouldn't worry too much about giving the free tools a try. Ask the Expert
-
Open source vs. commercial network access control (NAC) products
There are now a number of free and open source network access control (NAC) products, but how do they stack up against the commercial options? Network professional Mike Chapple reviews the free alternatives, but also warns readers that a "stepping st... Ask the Expert
-
What kinds of network packet data can be extracted from Snort IDS?
Snort IDS may be able to track information on received network packets, but network security expert MIke Chapple explains what the intrusion detection system is best used for. Ask the Expert
-
Can Snort be configured with a FreeBSD router?
Just because you can use Snort, it doesn't necessarily mean that you always should. In this expert Q&A, Mike Chapple explains which network configuration scenarios call for the intrusion defense tool and which ones don't. Ask the Expert
-
Buy vs. build: Choosing an enterprise intrusion detection system
When it comes to intrusion detection systems, should you buy or build? In this SearchSecurity.com Q&A, network security expert Mike Chapple explains when an enterprise should use a commercially supported product. Ask the Expert
Security Management Strategies for the CIO