News
Network security management
-
October 31, 2012
31
Oct'12
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 25, 2012
25
Oct'12
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person.
-
October 17, 2012
17
Oct'12
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise
-
October 02, 2012
02
Oct'12
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands.
-
September 27, 2012
27
Sep'12
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube
-
May 18, 2012
18
May'12
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products.
-
March 30, 2012
30
Mar'12
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed.
-
October 12, 2011
12
Oct'11
New batch of IDS, IPS evasion techniques are hitting their targets
Stonesoft has discovered 163 new advanced evasion techniques (AET), claiming these AETs can pass below the radar of some IDS, IPS products.
-
October 14, 2008
14
Oct'08
Using Wireshark to monitor and secure your network
Learn how to use packet analyser, Wireshark, in this illustrated tutorial.
-
March 27, 2008
27
Mar'08
Getting the best bargain on network vulnerability scanning
When it comes to enterprise network analysis, is it best to use a commercial vulnerability scanner or an open source product? Mike Chapple explains.
-
March 06, 2008
06
Mar'08
Losing the war to lock down networks might help enterprises innovate
While security concerns cannot be set aside, users unwilling to leave their own applications at home might bring some innovation to the office.
-
January 17, 2008
17
Jan'08
Wireless network security made easy - from "The Book of PF"
How to get wireless networks running and some options for making your wireless network more secure, including encryption for IEEE 802.11 wireless networks.
-
January 13, 2008
13
Jan'08
Holidays are over; now beware the gadgets
The post-holiday influx of consumer devices poses increased risk of data leakage and other threats to network security.
-
December 11, 2007
11
Dec'07
Cisco Trusted Security to boost network security, management
Cisco's Trusted Security (TrustSec) hardens network security while easing some management.
-
November 06, 2007
06
Nov'07
Cisco upgrades Catalyst 4500 and 6500 switches
Cisco today released updates to its modular Catalyst 4500 and 6500 switch series to add more capacity, scalability and redundancy.
-
October 11, 2007
11
Oct'07
Juniper updates network access control
Juniper has updated its Unified Access Control NAC products to include better pre- and post-admission, identity and role awareness and other new features.
-
October 10, 2007
10
Oct'07
Researchers warn of new attack methods against Cisco IOS
Several new attack methods against Cisco IOS were uncovered during an analysis conducted by researchers at Information Risk Management.
-
September 16, 2007
16
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out.
-
August 30, 2007
30
Aug'07
Network access control vendors: Attraction vs. retention
Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis.
-
August 13, 2007
13
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 09, 2007
09
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 01, 2007
01
Aug'07
Black Hat 2007: Researchers highlight new database attack method
At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers.
-
July 26, 2007
26
Jul'07
Stop simultaneous connections to corporate LANs and external Wi-Fi networks
How can you stop simultaneous connections to corporate LANs and external Wi-Fi networks? Find out from expert Lisa Phifer.
-
July 22, 2007
22
Jul'07
NAC growth sluggish as companies consider network security options
Companies are taking a wait-and-see approach, hoping the technology's maturity will make it more cost effective.
-
June 28, 2007
28
Jun'07
Network security: Overlay versus perimeter security model debated at Catalyst
Traditional network perimeter security -- firewalls, and even network access control -- may soon be pushed out in favour of using VPNs for network security, which could ease the security burden for networking staff, according to Dave Passmore. The ...
-
June 19, 2007
19
Jun'07
Securing the enterprise VoIP perimeter
How to make VoIP work without sacrificing firewalls or network perimeter security.
-
June 06, 2007
06
Jun'07
Network access controlled via biometrics
Fingerprint readers, a form of biometrics, have been used to protect data and endpoints, but now IT is using the security technology to control network access
-
May 22, 2007
22
May'07
Microsoft unveils unified communications devices
Microsoft unveils unified communications devices.
-
March 06, 2007
06
Mar'07
Unified communications translates to intelligent communications
Unified communications and its business benefits were the underlying themes of the keynote presentations yesterday at VoiceCon Spring 2007.
-
February 07, 2007
07
Feb'07
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Part two of our series on securing the OSI stack looks at the perils of Address Resolution Protocol.
-
January 16, 2007
16
Jan'07
Network security threats and answers, by industry
Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.
-
January 11, 2007
11
Jan'07
Network security -- Taking the layered approach
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.
-
January 07, 2007
07
Jan'07
NAC implementation slows as networking budgets grow
Network Access Control (NAC) implementations will decrease, despite growth in networking budgets.
-
December 10, 2006
10
Dec'06
Windows Vista security settings
Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security.
-
December 04, 2006
04
Dec'06
Spam -- stop it at the network edge
Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge.
-
October 12, 2006
12
Oct'06
What to do when your server goes down
When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.
-
September 24, 2006
24
Sep'06
Apple fixes Mac Wi-Fi flaws
Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.
-
September 12, 2006
12
Sep'06
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.
-
September 05, 2006
05
Sep'06
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.
-
September 05, 2006
05
Sep'06
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.
-
August 23, 2006
23
Aug'06
Remote access, WAN optimization, and network analysis news
Briefs: Remote access from Positive Networks helps with disaster recovery plans; Ipanema Technologies provides WAN optimization; Lancope rolls out network behavior analysis and response system tools.