Network access control

  • Intrusion detection debate heats up

    Posted June 27, 2003 - 2:15 pm

    Australia's Information Security Interest Group (ISIG) has rejected a Gartner Inc. report that calls intrusion-detection systems (IDS) a failed technology, blaming instead chief information officers (CIOs) who do not know how to manage the technology.
  • Duck and cover: Keeping viruses off your Palm

    Posted June 24, 2003 - 3:42 am

    Looking for antivirus software for Palm OS? This article summarizes the offerings.
  • Securing the handheld environment: An enterprise perspective

    Posted June 24, 2003 - 3:34 am

    This paper from Palm outlines the various security features in Palm OS that will help integrate Palm handhelds into a secure enterprise. Discussion covers passwords, encryption, VPNs, and more. (Paper is in PDF format.)
  • Wireless handhelds need defense-in-depth

    Posted June 24, 2003 - 3:19 am

    Handheld devices are often added to your corporate network in an ad hoc fashion, but you need to come up with a centralized security policy to deal with them. This article will help you get started.
  • Monitoring network integrity with nmap

    Posted June 24, 2003 - 2:42 am

    To wall off your external defenses but ignore the interior is folly, as many security incidents are inside jobs. This article explores the use of network mapping to keep control of your network.
  • Twenty uses for your old hardware

    Posted June 5, 2003 - 3:13 pm

    Don't want to throw out that old 486 you've got sitting in storage? Try setting it to some of the tasks on this list - from intrusion detection to print serving.
  • Watch out for hotel broadband vulnerabilities

    Posted May 28, 2003 - 12:41 am

    Many hotels now offer high-speed Internet connections to guests as a perk - but anyone on the hotel's internal network can access other guests' computers easily! Read on to find out about the firewalls and other types of tools necessary for the traveling telecommuter.
  • Fingerprint access gets a trial run

    Posted May 21, 2003 - 10:29 am

    Fingerprint access systems are currently being trialled at a number of Australian sites including the Department of Foreign Affairs and Trade (DFAT), Ernst & Young LLP and Technical and Further Education (TAFE) facilities.
  • Be careful with IDS automated responses

    Posted May 20, 2003 - 8:10 pm

    Installing an intrusion detection system doesn't mean that you can cut human decision-making out of the equation. Find out the cautions and pitfalls of dealing with an automated IDS response.
  • Attackers may try the door, but intrusion prevention tools won't let them in

    Posted May 20, 2003 - 8:01 pm

    Intrusion detection systems are the "action hero of the infosecurity universe" - and you can lose sight of their real capabilities in the hype. Read on to find out more about these systems.
  • Intrusion detection vs. intrusion prevention

    Posted May 20, 2003 - 7:42 pm

    In this article, vendor SecureWorks justifies the placement of its iSensor as an intrusion prevention system. See how the vendors are defining this space so that you can better evaluate their pitches.
  • Vendors push intrusion detection

    Posted May 20, 2003 - 7:31 pm

    The biggest problem with intrusion detection systems is inherent in their name - they only detect intrusion, leaving the reaction to someone else. Marketeers have latched on to this shortcoming and are promoting so-called intrusion prevention systems. But is this a real distinction?
  • Get real intrusion prevention

    Posted May 20, 2003 - 7:27 pm

    This article asserts that there is a real difference between an intrusion detection system and an intrusion prevention system. The author states that the former is passive, while the latter is active. Read on to find out the details.
  • Fielding a 'prevent' defense

    Posted May 20, 2003 - 7:23 pm

    This article outlines the intrusion prevention product space. Of particular interest is the sidebar entitled "Prevention vendors try to shed bad rap" (see the link in the grey nav box to the left of the article), in which the author discusses the problems of terminology and high expectations that have plagued the IDS and intrusion prevention industry.
  • Security wars: Can intrusion detection even the score?

    Posted May 20, 2003 - 7:16 pm

    Intrusion detection systems are an important weapon in your arsenal, but they aren't a cure-all. This article reviews some of the gaps that IDS systems don't yet fill - and some attacks that they will never be able to prevent.
  • Intrusion detection is not intrusion prevention

    Posted May 20, 2003 - 7:06 pm

    An intrusion detection system is much more than a conventional IDS - but some IDS manufacturers are doing their best to blur the two market segments. This article draws a firm line and discusses some of the shortcomings of the current IDS market.
  • Realistic expectations for intrusion detection systems

    Posted May 20, 2003 - 6:56 pm

    Too often, intrusion detection systems are seen by those installing them as a magic bullet that will solve all security ills. This article is a great reality check, helping you understand what an IDS can - and can't - do.
  • A call for better intrusion detection

    Posted May 20, 2003 - 5:38 pm

    Intrusion detection systems (IDS) are hot right now, but there's confusion in the market between prevention and detection. Here's one security evangelist's take on the IDS market, and his opinion on what features customers should be requesting from their vendors.
  • Use a sandbox to catch worms and viruses

    Posted April 7, 2003 - 7:53 pm

    What's the best way to catch a worm? One clever suggestion: set up a virtual system image, or "sandbox" on one of your servers. You can redirect malware that way and keep your real assets safe. One security expert shows you how it's done. (In PDF format.)
  • Securing Your Web Server, Part 3

    Posted October 17, 2001 - 11:12 am

    looking at the next higher layer of access control: password protection.

  • Top 10 security mistakes

    Posted July 9, 2001 - 9:46 am

    People are more careless with computers than perhaps any other thing of value in their lives. The reason is unclear, but observers agree that end users and even some IT departments can be pretty dumb when it comes to protecting computers and their contents.
  • Banks explore B2B payment options

    Posted May 10, 2001 - 10:09 am

    In the U.S. and Europe, banks are struggling to find the right approach to processing business-to-business payments on the Web and putting appropriate security checks in place as traditional banking networks, such as the Automated Checking House network, bring new payment methods via the Web.
  • Server lockdown locks out end users

    Posted April 25, 2001 - 1:27 pm

    What to do when your firewall is too effective.
  • How Hackers Hack

    Posted April 25, 2001 - 10:00 am

    With the click of a mouse on one computer, the screen of the laptop a few feet away flashes wildly as a flood of data flies silently across a private network cable connecting the two machines. Within a minute the laptop's file sharing password is compromised
  • Shark Tank: A little TOO random

    Posted April 19, 2001 - 4:47 pm

    Pilot fish subscribes to an online business newsletter and receives a computer-generated password. She objects to it and tries to change it. No can do. She tries to get the system to generate a different password. No luck. And without using the password, she can't read the newsletter.
Join us:






Join today!

See more content
Ask a Question