intrusion detection

  • Security vendors push intrusion-detection, professional services

    Posted September 12, 2011 - 10:42 am

    Established vendors and startups last week announced products and services for network intrusion-detection and outsourced security management.
  • LastPass shows how to handle potential data breach

    Posted May 5, 2011 - 12:26 pm

    Unlike other companies that have suffered major data breaches lately, LastPass pulled a server offline at the first hint of trouble and gave customers a detail of its recovery plan.
  • Intrusion protection tools improve on tests

    Posted January 12, 2011 - 2:53 pm

    The latest tests of crucial equipment used to protect Internet-facing corporate networks show they are improving but are far from perfect in stopping hacker attacks.
  • Review

    Intrusion detection honeypots simplify network security

    Posted November 18, 2010 - 3:42 pm

    Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats; KFSensor, HoneyPoint, and Honeyd offer safety, ease, and flexibility
  • MIT system helps companies recover from network intrusion

    Posted September 30, 2010 - 11:37 am

    MIT Computer Science and Artificial Intelligence Laboratory researchers will next week detail a system they say will make it easier for companies to recover from security intrusions.
  • Snort rival launches threat-detection start-up

    Posted September 27, 2010 - 3:16 pm

    Emerging Threats Pro debuted Monday with a rival intrusion detection and prevention signature technology to vendor Sourcefire, which shepherds open source Snort and its threat-detection signature base.
  • Sourcefire to add blocking to virtualization security wares

    Posted March 30, 2010 - 5:53 pm

    Sourcefire's software for protecting VMware and Xen virtualization environments is limited to monitoring and intrusion detection. Full-blown intrusion protection with blocking capability is in the works.
  • Juniper introduces Adaptive Threat Management

    Posted March 9, 2009 - 2:29 pm

    Juniper is introducing software that lets security platforms -- even those made by other vendors -- share and analyze log information in order to determine the root cause of network problems and fix them.
  • Database Crime Scene Prevention

    Posted February 23, 2009 - 12:17 pm

    This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. We will also cover best practices for protecting databases against these attacks methods.
  • A security wish list for fiscal 2009

    Posted December 19, 2008 - 11:29 am

    On the security wish list for 2009: better intrusion detection and reporting and data leak prevention. So, how do we move forward without funding? It's going to be tricky.
  • Why technology isn't the answer to better security

    Posted October 20, 2008 - 10:55 am

    In this, CIO's sixth year of conducting the "Global State of Information Security" survey with PricewaterhouseCoopers, they got an earful about the challenges, worries and wins in security technology, process and personnel.
  • How the feds are locking down their networks

    Posted August 12, 2008 - 12:41 pm

    The federal government is locking down its networks through an ambitious and fast-paced effort to eliminate connections to the Internet that are vulnerable to attack.
Join us:






Join today!

See more content
Ask a Question