Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
Corporations often need more wide area network (WAN) bandwidth but are deterred by its high cost and slow speed. Pricing for these lines runs from hundreds to thousands of dollars per month, and typically the links deliver 1.5 mbps (megabits per second) of throughput. . . .
Cisco has discovered a security flaw in its Cisco Security Agent software (CSA. This could be exploited by attackers to circumvent the security provided by the host-based intrusion prevention product. The network giant has issued a patch to fix the vulnerability. . . .
Authentication developers are preparing new systems that offer enhanced data security but reduce the burden strict access controls traditionally place on users. . . .
Corporate IT managers are a bit bi-polar when it comes to network security, said a survey released this week at the Computer Security Institute's annual conference in Washington, D.C. . . .
Four rivals in the application security market joined forces to help define more consistent and reliable best practices for Web application security. The partnership, announced Monday at the Computer Security Institute's 31st annual security conference and exhibition in Washington, includes F5 Networks, Imperva, NetContinuum and Teros. . . .
Security developers took more than a decade to move from intrusion detection to intrusion prevention in the world of wired networking. But in the fast-paced wireless space, vendors are already jumping on prevention as the first step in security. . . .
Former security advisor to the White House Richard Clarke said the number of zombie networked machines has risen to 15 times greater than last year's figure of 2,000 compromised PCs. . . .
One year after a vulnerability in the Wi-Fi Protected Access encryption algorithm was reported, a proof-of-concept program for the attack has been released. . . .
Newbury Networks, a provider of wireless-network management and security solutions, announced Monday a new version of its location-based security and containment product for WLANs. . . .
With fears of terrorism still in the air, vendors at this week's International Security Conference touted new surveillance technologies being used in transportation and logistics to pinpoint suspicious packages, peer inside transport vehicles and positively identify people even through darkness and fog. . . .
A federal grand jury has indicted a former University of Texas student on charges he hacked into the university system and stole Social Security numbers and other personal information from more than 37,000 students, faculty and staff. . . .
In the past couple of years, technologies such as intrusion detection and protection systems have become mainstream tools in the corporate security arsenal. But many feel less than satisfied with the performance of some of these technologies. . . .
IDC's projections of the rise in spending on security services reflect the growing need that businesses have to forge relationships with security professionals. "At the mid-market level, a lot of companies don't have a dedicated person handling security," says IDC analyst Christine Tenneson. . . .
Although potential wireless network users are being deterred by concerns about network security, companies continue to adopt the technology for data and voice. . . .
As enterprises scramble for security specialists to help lock down their networks, managed security services providers are developing increasingly sophisticated tools that take the burden off IT staffs entirely. . . .
There is no question that a number of the new mobile solutions that are being developed could help many business processes function more efficiently. . . .
Disgruntled or former employees pose a threat to any business and can gain access to internal systems relatively easily. Confidential company information can be used maliciously by employees either hacking into servers and files or by utilizing hacking tools readily available via the Internet and with a higher concentration of computer literate workers these risks are even more significant. . . .
This week, Symantec has unveiled its new corporate positioning. Long regarded as one of the leaders in the security technology space, the vendor has been building out its portfolio of offerings to drive security deep into organisations, whilst maintaining the high levels of computer systems availability that companies need to keep their businesses running efficiently. . . .
Japanese mobile operator NTT DoCoMo, Intel and IBM have started promoting a jointly developed specification for increasing the security of mobile commerce applications. . . .