Linux Network Security - Page 39

Discover Network Security News

Wireless LANs Gain Popularity Despite Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Corporations often need more wide area network (WAN) bandwidth but are deterred by its high cost and slow speed. Pricing for these lines runs from hundreds to thousands of dollars per month, and typically the links deliver 1.5 mbps (megabits per second) of throughput. . . .

Cisco fixes 'decoy attack' in security software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco has discovered a security flaw in its Cisco Security Agent software (CSA. This could be exploited by attackers to circumvent the security provided by the host-based intrusion prevention product. The network giant has issued a patch to fix the vulnerability. . . .

Single Sign-On Moves Forward

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Authentication developers are preparing new systems that offer enhanced data security but reduce the burden strict access controls traditionally place on users. . . .

Competitors Join Forces to Improve Web Application Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Four rivals in the application security market joined forces to help define more consistent and reliable best practices for Web application security. The partnership, announced Monday at the Computer Security Institute's 31st annual security conference and exhibition in Washington, includes F5 Networks, Imperva, NetContinuum and Teros. . . .

Prevention Methods Shore Up Wireless LAN Defenses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security developers took more than a decade to move from intrusion detection to intrusion prevention in the world of wired networking. But in the fast-paced wireless space, vendors are already jumping on prevention as the first step in security. . . .

Wireless Eyes Watching Airport Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With fears of terrorism still in the air, vendors at this week's International Security Conference touted new surveillance technologies being used in transportation and logistics to pinpoint suspicious packages, peer inside transport vehicles and positively identify people even through darkness and fog. . . .

Ex-Student Indicted on Hacking Charges

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal grand jury has indicted a former University of Texas student on charges he hacked into the university system and stole Social Security numbers and other personal information from more than 37,000 students, faculty and staff. . . .

Security Software Not Enough, Spending on Support to Rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IDC's projections of the rise in spending on security services reflect the growing need that businesses have to forge relationships with security professionals. "At the mid-market level, a lot of companies don't have a dedicated person handling security," says IDC analyst Christine Tenneson. . . .

Network-Based Security Grows

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As enterprises scramble for security specialists to help lock down their networks, managed security services providers are developing increasingly sophisticated tools that take the burden off IT staffs entirely. . . .

The Rise of Security Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Disgruntled or former employees pose a threat to any business and can gain access to internal systems relatively easily. Confidential company information can be used maliciously by employees either hacking into servers and files or by utilizing hacking tools readily available via the Internet and with a higher concentration of computer literate workers these risks are even more significant. . . .

Symantec drives security deep into enterprise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This week, Symantec has unveiled its new corporate positioning. Long regarded as one of the leaders in the security technology space, the vendor has been building out its portfolio of offerings to drive security deep into organisations, whilst maintaining the high levels of computer systems availability that companies need to keep their businesses running efficiently. . . .