Network device security Appliances firewalls and switches
- November 30, 2011
Researchers at Columbia University have discovered a vulnerability in HP’s LaserJet printers that could allow attackers to gain complete remote control.
- August 03, 2011
Noted researcher Dan Kaminsky presented his latest network security research topics, including vulnerabilities in P2P networks, UPNP and home routers.
- April 12, 2011
NSS Labs Inc., an independent testing firm, has found that some firewalls are failing stability tests and contain a flaw that enables attackers to easily bypass them.
- February 15, 2011
Many network security professionals take the wrong approach when testing their networks, according to one prominent security expert.
- February 14, 2011
Art of defence has formed a community to develop an open source Web application firewall, contributing its own dWAF code as a starting point.
- February 14, 2011
Lumension announced the Endpoint Intelligence Center to protect endpoint computers from threats, malware and third-party software vulnerabilities.
- July 28, 2010
While the vendors have released patches, SecureWorks researchers told Black Hat 2010 attendees that many enterprises place too much trust in their security systems and fail to check them for basic vulnerabilities.
- May 20, 2010
Oracle said the deal adds the Secerno database activity monitoring functionality to its line of database server security technologies.
- May 04, 2010
Some network administrators fear too many security features can cause bottlenecks, slowing the network or worse, shutting it down altogether.
- October 28, 2009
Columbia University researchers found thousands of devices, from home routers to video conferencing units at risk. They say their research has implications for enterprises.
- June 18, 2009
Companies see the benefits of placing network-oriented security on a faster processor.
- June 15, 2009
Tweaking rules could result in disrupting business communications or opening a hole for unauthorized traffic. Firewall management tools ease the burden.
- April 22, 2009
Technologists say security information and event management success depends not on the product, but on the risk and information management program implemented with it. Also, small businesses lack the resources to get much value from SIEM systems.
- March 17, 2009
Microsoft's new gateway lacks policy enforcement integration and does not detect the presence of sensitive data or provide PCI features.
- February 12, 2009
Technology architects must choose between a traditional or operational approach to security when selecting a secure gateway.