• April 09, 2007 09 Apr'07

    WEP crack demonstrates need for WPA2

    A new paper highlighting the weakness of Wired Equivalent Privacy (WEP) is a call to all users to switch to the more secure Wi-Fi Protected Access 2 (WPA2).  Continue Reading

  • April 09, 2007 09 Apr'07

    How can hackers bypass proxy servers?

    Hackers are bypassing proxy servers all the time and doing so for a variety of reasons. In this SearchSecurity.com expert Q&A, Ed Skoudis points out the holes in your protective filtering tools.  Continue Reading

  • April 09, 2007 09 Apr'07

    Can service providers prevent DDoS attacks?

    The results of a DDoS attack can be crippling, but what are service providers doing about the threat? In this SearchSecurity.com Q&A, Ed Skoudis explains how innovative ISPs are raising the bar -- and malicious hackers are jumping right over it.  Continue Reading

  • April 06, 2007 06 Apr'07

    Vista SP1: To be or not to be?

    This week in Security Blog Log: The owner of The Hotfix.net blog sparks controversy by posting what he claims are 100 fixes slated for Windows Vista Service Pack 1 (SP1).  Continue Reading

  • April 05, 2007 05 Apr'07

    AirDefense Enterprise

    Readers noted AirDefense Enterprise's ability to detect wireless intruders and mitigate attacks. The bronze medal product was also recognized for its access control capabilities.  Continue Reading

  • April 05, 2007 05 Apr'07

    QualysGuard Enterprise (2007)

    Readers gave QualysGuard Enterprise this year's gold, applauding the product's ability to identify network vulnerabilities quickly and accurately. QualysGuard -- which also audits networks for compliance -- received more high marks for its easy ...  Continue Reading

  • April 05, 2007 05 Apr'07

    Check Point VPN-1 Edge Appliance

    Taking silver largely for its ease of management, Check Point's VPN-1 Edge Appliance supports a number of wireless protocols and is designed to extend wireless threat management capabilities to enterprise branch offices.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close