Intrusion detection systems

Intrusion detection systems News

View All News

Intrusion detection systems Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Intrusion detection systems Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Intrusion detection systems

Learn to apply best practices and optimize your operations.

  • Layered security approach can thwart VoIP attacks

    A strategically placed firewall within your network infrastructure can help mitigate VoIP attacks. But encryption and proxy services add enhanced security. Continue Reading

  • In denial about DDoS: Defense planning falls short

    Advanced distributed denial-of-service attackers are using a mix of techniques to hit targeted victims in ways all too similar to advanced persistent threats. DDoS defense planning is still lax at many enterprises, but if you do not have mitigation processes in place, it will cost you. Response, brand reputation and opportunity costs quickly add up in major attacks. The primary cost for victims, tied to the length of the outage, is revenue interruption says John Pescatore, director of emerging trends at the SANS Institute. The former Gartner analyst looks at the current denial-of-service landscape and associated costs in his article, “DDoS defense planning falls short.” Adam Rice and James Ringold continue their series on APTs. In their article “Man versus machine data,” the authors outline strategies to implement verbose logging across the enterprise and discuss the promise of big data security analytics to help security professionals track the APT lifecycle. The hard issues around intellectual property protection and the steps enterprises and vendors are taking to address them are also covered this month in Feature Editor Kathleen Richards’ article, “Breaches reignite intellectual property protection.” We also welcome back longtime columnist Marcus Ranum, who starts off the year chatting about metrics with IBM’s Diana Kelley. Security 7 winner Frederick P. Chang, Ph.D., offers his take on what is needed to take cybersecurity education and science to the next level. Continue Reading

  • Malware defense: How to detect and mitigate advanced evasion techniques

    Expert Nick Lewis explores a number of techniques used by advanced malware to evade detection and explains how to detect and mitigate the threats. Continue Reading

View All Manage

Problem Solve Intrusion detection systems Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close