U.S. military wants to exert influence over private cyber infrastructure
The U.S. military wants to exert more influence over the protection of power grids, transportation networks and financial network systems, a Pentagon official says in a broad-ranging essay published in...
View ArticleMeeting the new PCI wireless requirements
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is...
View ArticleSnort rival launches threat-detection start-up
Emerging Threats Pro debuted Monday with a rival intrusion detection and prevention signature technology to vendor Sourcefire, which shepherds open source Snort and its threat-detection signature base.
View ArticleCisco launches high-end security appliance
Cisco today announced a multi-function security appliance that combines a firewall with VPN support, plus an intrusion-prevention system (IPS), to reach speeds up to 20 Gbps with 10,000 VPN connections...
View ArticleSourcefire acquires Immunet for cloud-based anti-malware
Sourcefire today announced it has acquired start-up Immunet for $21 million, including $17 million paid at closing and $4 million expected to be paid over the next 18 months upon “achievement of...
View ArticleMore powerful Sourcefire IPS line sets stage for next-gen firewalls
Sourcefire Monday announced a new line of intrusion-prevention systems (IPS) that sets the foundation for the company's anticipated foray into the application-aware next-generation firewall market...
View ArticlePerbandingan antara iPad 2 dan Sony Tablet S
Tablet yang mana yang harus saya beli? Perbandingan antara iPad 2 dan Sony Tablet S
View ArticleEvolving security standards a challenge for cloud computing, expert says
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security...
View ArticleReducing maximum time to resolution: The key to decreased downtime and...
Network downtime is an inescapable fact for networks of all sizes, and all the prevention and detection tools in the world won't allow analysts to quickly solve the problem. What's needed are tools...
View Article10 tips for implementing IPS securely
An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network...
View ArticleRSA offers Security Analytics as tool for detecting threats
RSA, the security division of EMC, today announced Security Analytics, its tool for real-time analysis of large amounts of data from security and business information to determine if an organization is...
View ArticleDHS use of deep packet inspection technology in new net security system...
To protect the federal civilian agencies against cyberthreats, the Department of Homeland Security (DHS) is preparing to deploy a more powerful version of its EINSTEIN intrusion-detection system that’s...
View ArticleGartner security survey: McAfee up, Trend Micro down
A Gartner report about the security software market shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot...
View ArticleStart-up tackles advanced persistent threats on Microsoft, Apple computers
Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers.
View ArticleSymantec software monitors sensitive Apple iOS iPhone, iPad e-mail
Symantec today said the updated version of its Data Loss Prevention (DLP) suite will be able to monitor confidential data sent by e-mail via Apple iPhones and iPads.
View ArticleStart-up morphs open-source security system for research networks into...
A start-up named Broala has been formed to expand the open-source intrusion detection system known simply as Bro that has been used in high-speed research networks for about two decades.
View ArticleCisco-Sourcefire union raises many product overlap questions
Industry watchers are bullish about the $2.7 billion Cisco buyout of security company Sourcefire announced today, but they have plenty of questions about how these competitors in intrusion-detection...
View ArticleSecurity firm's "DVR for network traffic" gets search and analysis boost
Security firm nPulse Technologies unveiled an updated version of its high-speed packet-capture appliance that now provides detailed search capabilities and session analysis of massive data collections.
View ArticleUSENIX: Gamers use DDoS as a service to cheat -- a lot
Cheating gamers pay as little as $10 per month to launch denial of service attacks against their opponents as a tactical advantage using commercial providers that walk the line between being legitimate...
View ArticleWhat litigation tells us about the dangers of IP theft
Former British Prime Minister Neville Chamberlain famously said "In war, there are no winners. Only losers." The same can be said of intellectual property (IP) lawsuits involving departing employees,...
View Article
More Pages to Explore .....