October 2005
-
October 31, 2005
31
Oct'05
Block and reroute denial-of-service attacks
Prevent denial-of-service and distributed denial-of-service attacks from taking down your network by blocking and rerouting DDoS and DoS traffic using honeypots, subnets and intrusion detection and prevention systems. Continue Reading
-
October 31, 2005
31
Oct'05
Securing Web apps against authenticated users
Improve Web site security by securing Web applications from authenticated users and avoiding client-side authentication. Continue Reading
-
October 31, 2005
31
Oct'05
Bots in the A/C, spyware in the 'fridge
Someday, hackers will target the computers in your air conditioner, refrigerator and TV. What can security professionals do about it? Continue Reading
-
October 28, 2005
28
Oct'05
U.S. Postal Service delivers intrusion prevention
Security Seven award winner Charles McGann discusses how the USPS successfully applied intrusion prevention solutions across their enterprise and how you can do so across your own. Continue Reading
-
October 28, 2005
28
Oct'05
Perfecting the security policy process
Phebe Waterfield, Security Analyst, Yankee Group discusses tactics for perfecting the security policy process in this presentation from Information Security Decisions. Continue Reading
-
October 27, 2005
27
Oct'05
7 steps to safeguard enterprise e-mail
Joel Snyder provides tactics enterprises can use to maintain an effective and secure e-mail system in this presentation from Information Security Decisions. Continue Reading
-
October 27, 2005
27
Oct'05
On the Line
See how five IPS appliances match up against attacks. Continue Reading
-
October 27, 2005
27
Oct'05
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats. Continue Reading
-
October 27, 2005
27
Oct'05
Aerial View
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape. Continue Reading
-
October 27, 2005
27
Oct'05
IPsec and SSL VPNs: Solving remote access problems
Learn how to solve remote access problems in this Information Security Decisions presentation by security expert Joel Snyder. Continue Reading
-
October 27, 2005
27
Oct'05
Antispyware: SurfControl's Enterprise Threat Shield 3.0
SurfControl's Enterprise Threat Shield 3.0 Continue Reading
-
October 27, 2005
27
Oct'05
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005. Continue Reading
-
October 27, 2005
27
Oct'05
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5 Continue Reading
-
October 27, 2005
27
Oct'05
Firewall VPN
ZyXEL Communication's ZyWALL P1 Continue Reading
-
October 27, 2005
27
Oct'05
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1 Continue Reading
-
October 27, 2005
27
Oct'05
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography. Continue Reading
-
October 27, 2005
27
Oct'05
Ping: Katrina's Security Survivors
Katrina's Security Survivors Continue Reading
-
October 27, 2005
27
Oct'05
Layer 8: SOX security spending is an old, wrinkled tactic
Darned SOX Continue Reading
-
October 27, 2005
27
Oct'05
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security. Continue Reading
-
October 27, 2005
27
Oct'05
Security Bytes: IE7 defenses revealed
In other news, former HP CEO Carly Fiorina takes a role with Cybertrust; malware exploits avian flu fears; and Zotob's impact is measured. Continue Reading