Intrusion detection News
December 18, 2015
Advanced persistent threat detection vendor Cyphort noted strides it made in the channel since launching its partner program in October of last year; plus, other IT channel news from the week.
November 03, 2015
Experts approve of the Cybersecurity Strategy and Implementation Plan issued by the White House to strengthen government cybersecurity guidelines and practices, but worry about implementation.
September 15, 2015
A new report shows that hackers are manipulating the ownership settings of the Google Search Console in order to hijack website analytics for use in black hat SEO campaigns and more.
September 11, 2015
The U.S. Department of Energy became the latest government cyberattack victim after a report disclosed the agency had suffered more than 1,000 cyberattacks in a four-year span.
Intrusion detection Get Started
Bring yourself up to speed with our introductory content
In this IT security tutorial, we explore key vulnerabilities of hyper-converged infrastructure technology that could potentially affect your customers. Continue Reading
Expert Karen Scarfone explains how nearly every organization can benefit from the insight that SIEM products provide. Continue Reading
Expert Karen Scarfone examines security information and event management systems and explains why they are crucial for enterprise security. Continue Reading
Evaluate Intrusion detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The cloud access security broker space is accelerating at a fast clip, but expert Rob Shapland explains some obstacles for enterprises to consider before selecting a CASB platform. Continue Reading
Many CISOs are now in the hot seat, seeking better ways to embrace mobility while combating high-priority mobile security threats. As mobile devices become productivity tools, security professionals need to pay attention to data classification and mobile risk assessment. Failed attempts to safeguard enterprise data by banning mobile data access or locking down smartphones and tablets demonstrate a pressing need for more effective strategies against mobile security threats. We explore pitfalls to avoid and best practices that have proven effective. Learn about emerging technologies -- from containerized apps to context-aware policies -- that can help your enterprise stop costly mobile data leaks.
Integration and better performance is the name of the game as enterprise firewalls offer greater visibility, next-generation IPS and advanced threat functionality without slowing down the network. We asked readers who plan to invest in security technology in the next the 12 months which enterprise firewalls and advanced threat detection tools made it onto their short lists. We unveil Readers’ Top Picks for enterprise firewalls from perimeter to next generation systems. We also ask them about the layers of defense, namely advanced threat detection, that they seek for these security appliances. Finally, keeping up with technology advances can become a full-time job. We ask CISOs what strategies they adopt to follow the latest tech and how they find benchmarks to determine its enterprise effectiveness. Continue Reading
Channel partners, particularly those with IT security experience, may find new opportunities in the emerging field of breach detection technology. Continue Reading
Manage Intrusion detection
Learn to apply best practices and optimize your operations.
Worried that attackers may know your infrastructure better than you do? Cyberthreats are learning fast from defenses that detect them. New strategies focus on what happens next. Continue Reading
The U.S. Postal Service suspended teleworking following a recent breach. Expert Kevin Beaver explains why teleworkers aren't always to blame in the event of a breach and explores methods for secure VPN access. Continue Reading
Advanced malware is stealthy and deadly. Learn how defend your network and data against it with tools that provide advanced malware detection capabilities. Continue Reading
Problem Solve Intrusion detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these VPN-enabled threats. Continue Reading
Not responding to low-level threats can be perilous, yet enterprises can't always examine each issue. Expert Nick Lewis explains when an investigation is imperative. Continue Reading
Malware authors are adopting software wrapping to hide malicious code and avoid detection. Expert Nick Lewis explains how to defend against the threat. Continue Reading