Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
Computer and network security risks continue to plague IT managers and network administrators as both the sheriffs and the outlaws of security are finding new ways to penetrate and defend IT assets. It is clear that security technologies, like other IT . . .
The security firm says cyber-attackers are refocusing their efforts on PCs inside the perimeter of corporate networks Corporations should be as concerned about personal computers inside the network perimeter as those riding its boundary, warns Symantec's security team. Vincent Weafer, senior . . .
Every corporate IT department faces its share of security threats from the outside world. But contact centers face double the danger, since potential data thieves likely lurk in their own ranks as well. . .
Firms that are unconvinced about the wisdom of installing an 802.11b network may find their employees decide to rectify the situation with a trip to Dixons The booming enthusiasm for wireless connectivity among office workers is proving a headache for IT . . .
Something was wrong with the Web server. It was nearly 5:30 p.m., and no mail had been delivered for roughly an hour. When I logged on, I discovered that the disk partition dedicated to incoming e-mail was pegged at 102 percent . . .
Greyware Automation Products, a small business, has been scrambling for the past week to keep itself alive as it's barraged by a denial-of-service attack launched by the Swen virus.. . .
They have their networks locked tight, their data hidden behind firewalls and their e-mail scanned by virus protection software. But too many IT managers and security officers overlook a crucial security risk: the telephone system. As voice over IP (VoIP) setups . . .
As information security technology evolves and our infosec tool belts get heavier, most veteran practitioners find themselves longing for smarter--not more--tools. Sure, we have antivirus gateways, in-line content filters, firewalls, scanners, biometric devices, crypto suites and intrusion-detection systems. And we pump thousands--if not millions--of dollars into technology-enabled solutions to our technology-created problems.. . .
Who hasn't suffered from an cyberincursion and yearned to strike back at the attacker? Who didn't smile a little when the Nachi worm, which attempted to undo the damage caused by other worms, was released into the wild? "Strikeback" - actions . . .
Secure Web services took another step toward reality Monday with the introduction of implementation guidelines and progress on standards development. Analysts said that security remains an important barrier to customer adoption of Web services, a set of evolving standards for sharing information.. . .
Jan Kanclirz submits This is a paper describing security meassures one should take that are often overlooked at our Edge Routers. Securing routers with secure management protocols like SSH and filtering advise to prevent unwanted attacks. . .
The need for wireless policy has never been greater. 802.11/a/b/g wireless networks (WLANs) [1] have taken the Information Technology world by storm. With 35 million units expected to sell in 2003 and with a predicted growth rate of 50-200% compounded year . . .
Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information security. Any form of wireless communications that is not properly encrypted can be intercepted with the right equipment--in some cases nothing . . .
Battle lines have been drawn, and volleys are being lobbed between the analyst and vendor camps. In dispute: Whether intrusion prevention is out of commission or the next network security salvation. On one side, Gartner has cast intrusion detection into its . . .
Most people know how problematic protection against SYN denial of service attacks can be. Several methods, more or less effective, are usually used. In almost every case proper filtering of packets is a viable solution. In addition to creating packet filters, . . .
Cyber guerillas are the newest breed of hackers. They love to hunt and sniff the air for signals emitted from the wireless handheld devices that you use to connect primarily with the WLAN. They then exploit the vulnerable network to launch . . .
With wireless access points proliferating into hotels, airports and convention centers, there is a real need for security enhancements that will make the corporate world more confident in Wi-Fi technology, says Yankee Group wireless/mobile services director Roberta Wiggins. "Enterprises are . . .
One day, wireless networks will blend so seamlessly with the wired infrastructure that wireless LANs (WLANs) will cease to exist as a separate category. While that day may be indeed glimmering on the networking horizon, it definitely hasn't dawned yet. At . . .
No computer connected to a network is completely safe. Any computer that communicates with another, even occasionally, can fall victim to the threats that race around our interconnected world. Hackers live in any country. And the worms and viruses with the cute names -- Code Red, Blaster, Nimba, Slammer, Sobig -- don't recognize national borders.. . .
There you are: sitting in your favorite bookstore/café, sipping a caramel latte and casually leafing through the latest copy of Wired magazine when you are suddenly bombarded from almost every direction without warning and with no means to stop it. Fortunately, . . .