Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
Firms that are unconvinced about the wisdom of installing an 802.11b network may find their employees decide to rectify the situation with a trip to Dixons The booming enthusiasm for wireless connectivity among office workers is proving a headache for IT . . .
Something was wrong with the Web server. It was nearly 5:30 p.m., and no mail had been delivered for roughly an hour. When I logged on, I discovered that the disk partition dedicated to incoming e-mail was pegged at 102 percent . . .
Greyware Automation Products, a small business, has been scrambling for the past week to keep itself alive as it's barraged by a denial-of-service attack launched by the Swen virus.. . .
They have their networks locked tight, their data hidden behind firewalls and their e-mail scanned by virus protection software. But too many IT managers and security officers overlook a crucial security risk: the telephone system. As voice over IP (VoIP) setups . . .
As information security technology evolves and our infosec tool belts get heavier, most veteran practitioners find themselves longing for smarter--not more--tools. Sure, we have antivirus gateways, in-line content filters, firewalls, scanners, biometric devices, crypto suites and intrusion-detection systems. And we pump thousands--if not millions--of dollars into technology-enabled solutions to our technology-created problems.. . .
Who hasn't suffered from an cyberincursion and yearned to strike back at the attacker? Who didn't smile a little when the Nachi worm, which attempted to undo the damage caused by other worms, was released into the wild? "Strikeback" - actions . . .
Secure Web services took another step toward reality Monday with the introduction of implementation guidelines and progress on standards development. Analysts said that security remains an important barrier to customer adoption of Web services, a set of evolving standards for sharing information.. . .
Jan Kanclirz submits This is a paper describing security meassures one should take that are often overlooked at our Edge Routers. Securing routers with secure management protocols like SSH and filtering advise to prevent unwanted attacks. . .
The need for wireless policy has never been greater. 802.11/a/b/g wireless networks (WLANs) [1] have taken the Information Technology world by storm. With 35 million units expected to sell in 2003 and with a predicted growth rate of 50-200% compounded year . . .
Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information security. Any form of wireless communications that is not properly encrypted can be intercepted with the right equipment--in some cases nothing . . .
Battle lines have been drawn, and volleys are being lobbed between the analyst and vendor camps. In dispute: Whether intrusion prevention is out of commission or the next network security salvation. On one side, Gartner has cast intrusion detection into its . . .
Most people know how problematic protection against SYN denial of service attacks can be. Several methods, more or less effective, are usually used. In almost every case proper filtering of packets is a viable solution. In addition to creating packet filters, . . .
Cyber guerillas are the newest breed of hackers. They love to hunt and sniff the air for signals emitted from the wireless handheld devices that you use to connect primarily with the WLAN. They then exploit the vulnerable network to launch . . .
With wireless access points proliferating into hotels, airports and convention centers, there is a real need for security enhancements that will make the corporate world more confident in Wi-Fi technology, says Yankee Group wireless/mobile services director Roberta Wiggins. "Enterprises are . . .
One day, wireless networks will blend so seamlessly with the wired infrastructure that wireless LANs (WLANs) will cease to exist as a separate category. While that day may be indeed glimmering on the networking horizon, it definitely hasn't dawned yet. At . . .
No computer connected to a network is completely safe. Any computer that communicates with another, even occasionally, can fall victim to the threats that race around our interconnected world. Hackers live in any country. And the worms and viruses with the cute names -- Code Red, Blaster, Nimba, Slammer, Sobig -- don't recognize national borders.. . .
There you are: sitting in your favorite bookstore/café, sipping a caramel latte and casually leafing through the latest copy of Wired magazine when you are suddenly bombarded from almost every direction without warning and with no means to stop it. Fortunately, . . .
Whether you have one machine connected to the Internet or ten thousand, keeping your network secure should be a top priority. You patch your web server and are mindful of your firewall configuration, but is your site really secure? How do you check it?. . .
Battle lines have been drawn, and volleys are being lobbed between the analyst and vendor camps. In dispute: Whether intrusion prevention is out of commission or the next network security salvation. On one side, Gartner has cast intrusion detection into its . . .
Akamai's Linux-based servers to protect its Microsoft.com Web site and reduce the site's vulnerability to viruses, worms and denial of service attacks. Microsoft has been in turmoil over the past couple of weeks, after at least three significant worm and virus . . .