Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
A team of professors from the University of California-Berkeley and University of Southern California has received a $5.46 million grant to build one of the most realistic models of the Internet -- and then wreck it with debilitating hacker attacks. Working . . .
A researcher at ICSA Labs has reported that some implementations of Wi-Fi Protected Access (WPA), a standard for cryptography of data on Wi-Fi networks, can be compromised through a dictionary attack. Robert Moskowitz, senior technical director at ICSA Labs, detailed the . . .
Kenneth Tyminski is in an unenviable position. As chief information security officer for Prudential Insurance Company of America, he's the first one likely to receive blame when a network security snafu affects his company's bottom line. But Tyminski told attendees at . . .
Security is the cornerstone of any remote-access implementation; it is axiomatic that good security is easily managed security. SSL VPN appliances can quickly integrate into the network, providing companies with a rapid-deployment solution without modifications or interruptions to existing application servers . . .
Business owners don't walk away from their buildings at night and leave the doors wide open. But quite a few are doing something that could become nearly as dangerous: Leaving wireless networks wide open to anyone passing by with a portable . . .
t has been little more than a year since a massive data attack struck the underpinnings of the Internet, and security experts say a more coordinated attempt could do even worse damage. On October 21, 2002, people around the world cruised . . .
In this article i will give you 8 steps, easy to follow, to minimize your Cisco router exposure, by turning off some unused services, applying some access control. Network Security is a completely changing area; new devices like IDS (Intrustion . . .
With viruses and worms popping up in the news more and more often - like the infamous Blaster worm that infested computer networks in August -security incidents seem to be increasing at an epidemic rate. According to a study by the . . .
The value of a computer's information determines its desirability as a target for hacking -- but only in part. Even valueless machines can serve as jumping-off sites for additional attacks once compromised, or be used to gather information about an ostensibly . . .
Edge-router VPN (virtual private network) capabilities are the next step in functionality from point-to-point multiservice networking. This is a big - and potentially confusing - subject because there are different types of VPNs, and these can be implemented in different ways . . .
Your identity-management system doesn't have to dictate your corporate security strategy anymore. SAML (Security Assertion Markup Language) provides a standard way to exchange authentication and authorization information between different vendors' other applications so you can switch from LDAP to RADIUS authentication, for instance, without recoding your applications.. . .
Put simply, a security operations guide is a document that clearly defines your network's security-related policies and procedures. Over the years, I've done security-related consulting for a number of organizations. In these real-world environments, I've always found that the organizations that . . .
Experts have re-emphasised the need for companies to improve their IT security infrastructures, at a recent forum in Norway. At the OECD's Global Forum on Information Systems and Network Security, Jeremy Ward, director of services development for Symantec, said that many . . .
A year after surviving a massive distributed denial-of-service attack, the Internet's root servers are better fortified against hacker activity, thanks to behind-the-scenes deployment of a routing technique known as Anycast, experts say.. . .
You can't manage what you can't see. So it's not surprising that with corporate networks congested more and more by P2P, streaming media, and other "leisure" traffic, network admins are increasingly turning to specialized network management software packages and appliances to . . .
Hackers are increasingly resorting to social engineering techniques to obtain confidential passwords, as businesses become better at locking down and patching their computer networks. And the bad news is that users are still very much the weak link when it comes . . .
According to Johna Johnson, president and chief research officer at Nemertes Research, SSL defines a secure, encrypted communications mechanism between applications, most commonly between a web browser and server, and is independent of the underlying protocols, particularly IP (see also page . . .
Retailers worldwide are making the move to wireless computing, both for the flexibility it brings to in-store operations and the speed it adds to business processes. Mobile platforms and wireless networks allow retailers to complete transactions and authorizations while collecting data . . .
Every IT department with mission-critical computer operations tries to implement security measures to protect its network from data loss, performance degradation or other damage, but such damage inevitably occurs in even the best-defended environments. Most network performance and security products report . . .
Joshua Wright, the systems engineer who created a tool that targets wireless LANs protected by Cisco Systems Inc.'s Lightweight Extensible Authentication Protocol (LEAP), said he did so to demonstrate the ease with which dictionary attacks against the protocol can crack user passwords.. . .