Blog Posts Tagged with "Network Security"


Complexity - A Sure Way to Fail

January 11, 2011 Added by:Rafal Los

Almost every single product's marketing page has "Ease of Use" as one of the checkbox features, it's rare that this actually manifests itself in the real products. The end result of difficult to use security products is clear - security breaches are rampant. You don't have to take my word for it...

Comments  (4)


Getting Off the Patch

January 10, 2011 Added by:Pete Herzog

Patching is just one small part of the solution that includes Anti-virus, firewalls, intrusion detection systems, strong authentication, encryption, physical locks, disabling of scripting languages, reduced personal information on social networks,as part of a healthy lifestyle solution...

Comments  (13)


WikiLeaks Lessons for IT Security

January 03, 2011 Added by:Eli Talmor

Obviously Data Loss Prevention policies need to be implemented on endpoint workstations across the Globe: Every document needs to be classified (i.e. encrypted) at generation. The document encrypted should be also “fingerprinted” to prevent distribution in “un-encrypted” form...

Comments  (0)


Objective Comparison on Prominent (D)DoS Solutions

December 19, 2010 Added by:Alicia Smith

In order to effectively determine the best solution you must know some key things about DDoS and your own network. There are many different types of DDoS attacks and they can affect your network in various ways - all of which are negative...

Comments  (0)


New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)


Why an Anti-Virus Can’t Protect You from All Viruses

November 18, 2010 Added by:Dan Dieterle

Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...

Comments  (2)


Defending Your Network: Detection versus Prevention

November 17, 2010 Added by:Robb Reck

Our prevention systems cannot block every type of malicious activity, and we should not expect them to. Implementing high quality detective technologies gives us the kind of visibility into what's going on in our network that we can never have without them...

Comments  (0)


U.S.Banks Vulnerable to Sabotage

December 19, 2008 Added by:Anthony M. Freed

Democratic U.S. Rep. James Langevin of Rhode Island, who chairs the homeland security subcommittee on cybersecurity, said: “We’re way behind where we need to be now.” Dire consequences of a successful attack could include failure of banking or national electrical systems, he said...

Comments  (3)

Page « < 42 - 43 - 44 - 45 - 46 > »