Intrusion detection News
May 19, 2016
Security focused software application developers like to drop this favourite one-liner to remind us just how insecure we all are… “There are only two types of companies: those that have been ...
May 05, 2016
DARPA has decided to take on one of the most difficult tasks in cybersecurity -- building a cyber attribution system to be able to identify attackers and maybe prevent attacks.
December 18, 2015
Advanced persistent threat detection vendor Cyphort noted strides it made in the channel since launching its partner program in October of last year; plus, other IT channel news from the week.
November 03, 2015
Experts approve of the Cybersecurity Strategy and Implementation Plan issued by the White House to strengthen government cybersecurity guidelines and practices, but worry about implementation.
Intrusion detection Get Started
Bring yourself up to speed with our introductory content
A hard to detect type of Linux malware, Rekoobe, can download files to user systems. Expert Nick Lewis explains the malware's key functionality and how to mitigate attacks. Continue Reading
While our enterprise uses an array of AWS tools, we'd like to improve our data security measures. What tools are available to help secure data and resources in AWS? Continue Reading
It is not hard to make the shift from independent controls for defense in depth to interlocking strategies, Ron Dilley tells Marcus Ranum, but careful planning is required. Continue Reading
Evaluate Intrusion detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Juniper firewall products were found to have two backdoor vulnerabilities. Expert Michael Cobb explains how a cryptographic algorithm and hardcoded password enabled this to happen. Continue Reading
More companies are investing in security information and event management to improve their response to targeted attacks, according to the readers we surveyed. Continue Reading
A remote administration tool like GlassRAT can go undetected for long periods of time. Expert Nick Lewis uncovers how this type of malware works and affects corporations. Continue Reading
Manage Intrusion detection
Learn to apply best practices and optimize your operations.
Governance, risk and compliance processes face numerous complications in the digital age. Companies' data volumes continue to grow exponentially, while information security threats and regulatory mandates constantly evolve. Digitization does have its GRC benefits, however. The vast amount of data stored by the average modern company presents a treasure trove of analytics information that can help prevent future security incidents and regulatory infractions. These GRC benefits extend to the rest of the business as well, potentially improving customer relations, streamlining resources and boosting the bottom line. In this handbook, learn how companies can draw business value from GRC analytics data and develop strategies to incorporate analytics best practices that will benefit company-wide business processes. Continue Reading
Worried that attackers may know your infrastructure better than you do? Cyberthreats are learning fast from defenses that detect them. New strategies focus on what happens next. Continue Reading
In this IT security tutorial, we explore key vulnerabilities of hyper-converged infrastructure technology that could potentially affect your customers. Continue Reading
Problem Solve Intrusion detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting victims. Continue Reading
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these VPN-enabled threats. Continue Reading
Many CISOs are now in the hot seat, seeking better ways to embrace mobility while combating high-priority mobile security threats. As mobile devices become productivity tools, security professionals need to pay attention to data classification and mobile risk assessment. Failed attempts to safeguard enterprise data by banning mobile data access or locking down smartphones and tablets demonstrate a pressing need for more effective strategies against mobile security threats. We explore pitfalls to avoid and best practices that have proven effective. Learn about emerging technologies -- from containerized apps to context-aware policies -- that can help your enterprise stop costly mobile data leaks.
Integration and better performance is the name of the game as enterprise firewalls offer greater visibility, next-generation IPS and advanced threat functionality without slowing down the network. We asked readers who plan to invest in security technology in the next the 12 months which enterprise firewalls and advanced threat detection tools made it onto their short lists. We unveil Readers’ Top Picks for enterprise firewalls from perimeter to next generation systems. We also ask them about the layers of defense, namely advanced threat detection, that they seek for these security appliances. Finally, keeping up with technology advances can become a full-time job. We ask CISOs what strategies they adopt to follow the latest tech and how they find benchmarks to determine its enterprise effectiveness. Continue Reading