Endpoint Security

Endpoint security news, solutions, and analysis for IT professionals
  • Security alert: War driving in your backyard

    Posted June 5, 2003 - 4:20 pm

    Corporate networks have long been the focus of war driving efforts. But as Wi-Fi becomes more universally popular, interested eyes shift to the home user. Read on to find out more.
  • Drive-by hacking on the go

    Posted June 5, 2003 - 4:15 pm

    This article looks at some of the faces behind the war driving phenomenon. You'll see that there are as many reasons for war driving as there are war drivers; some are doing it for fun, some for curiosity, some for more sinister reasons.
  • War drive illustrates wireless problem

    Posted June 5, 2003 - 4:10 pm

    The author of this article took a drive through Washington, D.C., with a team of security experts, and was shocked at the number of unguarded wireless networks they found. Read on to find out more about the problem.
  • Spoofing the war drivers

    Posted June 5, 2003 - 4:02 pm

    It's becoming increasingly clear that war driving is an easy way to access a wireless network. This article outlines one means to combat war drivers: a handy Perl script that provides security through obscurity in a clever way.
  • War driving: Who's browsing your wireless network?

    Posted June 5, 2003 - 3:49 pm

    If war drivers have honed in on your facility, you don't know who's snooping around in your network. This article focuses on preventing such intrusion.
  • Twenty uses for your old hardware

    Posted June 5, 2003 - 3:13 pm

    Don't want to throw out that old 486 you've got sitting in storage? Try setting it to some of the tasks on this list - from intrusion detection to print serving.
  • Watch out for hotel broadband vulnerabilities

    Posted May 28, 2003 - 12:41 am

    Many hotels now offer high-speed Internet connections to guests as a perk - but anyone on the hotel's internal network can access other guests' computers easily! Read on to find out about the firewalls and other types of tools necessary for the traveling telecommuter.
  • Fingerprint access gets a trial run

    Posted May 21, 2003 - 10:29 am

    Fingerprint access systems are currently being trialled at a number of Australian sites including the Department of Foreign Affairs and Trade (DFAT), Ernst & Young LLP and Technical and Further Education (TAFE) facilities.
  • Be careful with IDS automated responses

    Posted May 20, 2003 - 8:10 pm

    Installing an intrusion detection system doesn't mean that you can cut human decision-making out of the equation. Find out the cautions and pitfalls of dealing with an automated IDS response.
  • Attackers may try the door, but intrusion prevention tools won't let them in

    Posted May 20, 2003 - 8:01 pm

    Intrusion detection systems are the "action hero of the infosecurity universe" - and you can lose sight of their real capabilities in the hype. Read on to find out more about these systems.
  • Intrusion detection vs. intrusion prevention

    Posted May 20, 2003 - 7:42 pm

    In this article, vendor SecureWorks justifies the placement of its iSensor as an intrusion prevention system. See how the vendors are defining this space so that you can better evaluate their pitches.
  • Vendors push intrusion detection

    Posted May 20, 2003 - 7:31 pm

    The biggest problem with intrusion detection systems is inherent in their name - they only detect intrusion, leaving the reaction to someone else. Marketeers have latched on to this shortcoming and are promoting so-called intrusion prevention systems. But is this a real distinction?
  • Get real intrusion prevention

    Posted May 20, 2003 - 7:27 pm

    This article asserts that there is a real difference between an intrusion detection system and an intrusion prevention system. The author states that the former is passive, while the latter is active. Read on to find out the details.
  • Fielding a 'prevent' defense

    Posted May 20, 2003 - 7:23 pm

    This article outlines the intrusion prevention product space. Of particular interest is the sidebar entitled "Prevention vendors try to shed bad rap" (see the link in the grey nav box to the left of the article), in which the author discusses the problems of terminology and high expectations that have plagued the IDS and intrusion prevention industry.
  • Security wars: Can intrusion detection even the score?

    Posted May 20, 2003 - 7:16 pm

    Intrusion detection systems are an important weapon in your arsenal, but they aren't a cure-all. This article reviews some of the gaps that IDS systems don't yet fill - and some attacks that they will never be able to prevent.
  • Intrusion detection is not intrusion prevention

    Posted May 20, 2003 - 7:06 pm

    An intrusion detection system is much more than a conventional IDS - but some IDS manufacturers are doing their best to blur the two market segments. This article draws a firm line and discusses some of the shortcomings of the current IDS market.
  • Realistic expectations for intrusion detection systems

    Posted May 20, 2003 - 6:56 pm

    Too often, intrusion detection systems are seen by those installing them as a magic bullet that will solve all security ills. This article is a great reality check, helping you understand what an IDS can - and can't - do.
  • A call for better intrusion detection

    Posted May 20, 2003 - 5:38 pm

    Intrusion detection systems (IDS) are hot right now, but there's confusion in the market between prevention and detection. Here's one security evangelist's take on the IDS market, and his opinion on what features customers should be requesting from their vendors.
  • Use a sandbox to catch worms and viruses

    Posted April 7, 2003 - 7:53 pm

    What's the best way to catch a worm? One clever suggestion: set up a virtual system image, or "sandbox" on one of your servers. You can redirect malware that way and keep your real assets safe. One security expert shows you how it's done. (In PDF format.)
Join us:






Join today!

See more content
Ask a Question