Intrusion detection

Intrusion detection News

View All News

Intrusion detection Get Started

Bring yourself up to speed with our introductory content

  • Dan Kaminsky on detecting malware with one line of code

    Security luminary and White Ops co-founder Dan Kaminsky reveals the one common tool employed by remote attackers that is leading to a new way to detect malware. Continue Reading

  • long-tail intrusion

    Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and continued by downloading new code by means such as Trojans hidden by root kits and code targeting zero day vulnerabilities. Continue Reading

  • breach detection system (BDS)

    Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS to protect against the variety of advanced threats, especially unidentified malware. Continue Reading

View All Get Started

Evaluate Intrusion detection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Are there new spam rules to mitigate spam techniques?

    Expert Nick Lewis explores the latest spam defense methods and products that will help enterprises defend against new and emerging spam techniques. Continue Reading

  • What enterprises need to know about the Regin malware toolkit

    The sophisticated Regin malware contains features that hackers can adopt into other enterprise malware threats. Expert Nick Lewis explains how to combat this risk. Continue Reading

  • What to look for in threat intelligence services

    Acquiring access to threat intelligence services is a relatively easy way to improve the quality of attack detection throughout the network security infrastructure of your enterprise. A threat intelligence service identifies the IP addresses, hostnames, URLs, or other characteristics of the threats associated with attacks. It then standardizes the data, which is fed to a SIEM, threat detection and other network security system (or cloud-based offering) to detect potential sources of attacks. As long as the network security infrastructure supports the feeds and has sufficient processing power to use and apply them, organizations can see a significant reduction in incidents and damage simply by adding threat intelligence feeds and enforcing policies related to the information provided by these feeds. While there is no sure-fire way to detect and prevent advanced attacks, enterprises both large and small should explore whether threat intelligence services can give them a badly needed boost.

    This Buyer’s Essential guide explains what you need to know if you’re in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from the adding a threat intelligence feed to your security system. Continue Reading

View All Evaluate

Manage Intrusion detection

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Intrusion detection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close