Features

Using events-per-second as a factor in selecting SEM tools

Using events-per-second as a factor in selecting SEM tools

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.
Roberto Angelino, Oct 19 2004 5:46PM Security
Keeping email legal – the issues of email monitoring

Keeping email legal – the issues of email monitoring

Thanks to its speed, accessibility and ease of use, email is an essential part of both our business and personal lives. But as the IT departments charged with managing a company’s email deal with increasing volumes of traffic, spam levels and virus-infected mail, they also encounter a minefield of legal traps and regulatory pitfalls when they monitor employees’ emails.
Ken Watt Oct 19 2004 5:46PM Security
Why every business needs an SCM strategy

Why every business needs an SCM strategy

Running a business has changed a lot over time—businesses are increasingly becoming more global in nature and constantly taking advantage of technology to help them become more efficient, cost conscious and competitive.
Zoe Lowther Oct 19 2004 5:46PM Security
ID mapping: the compliance key

ID mapping: the compliance key

Brian Milas argues that identity mapping offers cost and security benefits, while meeting strict regulations
Brian Milas Oct 15 2004 4:59PM Security
BT’s new boy is ready for action

BT’s new boy is ready for action

Ray Stanton has been set a tough goal – to turn BT into a major force in managed security services. Ron Condon finds out about how he plans to go about it
Ron Condon Oct 15 2004 4:25PM Security
We are all doomed – if you believe the hype

We are all doomed – if you believe the hype

Jon Tullett Oct 15 2004 4:24PM Security
We must beat these automated attackers

We must beat these automated attackers

Automated intrusion worms go around exploiting network vulnerabilities at a rapid rate and can be hard to beat. Kevin Mandia talks about some tried and tested methods used in response to these type of attacks
Kevin Mandia Oct 15 2004 4:24PM Security
Don’t hesitate to call in the professionals

Don’t hesitate to call in the professionals

After online banking customers suffer an attack, financial institutions often look for answers in the wrong places. Kevin Mandia explains why it’s worth investigating the victim’s PC to discover the origins of an attack
Kevin Mandia Oct 15 2004 4:23PM Security
Time to call out the detectives

Time to call out the detectives

Once, the primary goal was to protect network perimeters. But today’s methodologies can do a great deal more than that.
Yiannis Vassiliades Oct 15 2004 4:23PM Security
A safer way to stay in contact

A safer way to stay in contact

As workforces are becoming increasingly mobile, companies are searching for a variety of technologies to secure mobile users.
Marcia Savage Oct 15 2004 4:22PM Security
Biometrics: How to plan your very own project

Biometrics: How to plan your very own project

Good planning before you implement biometrics is key if you want to reap the benefits of this technology, Martin Jacobs explains why
Martin Jacobs Oct 15 2004 4:22PM Security
Biometrics get the thumbs up

Biometrics get the thumbs up

The appeal of biometrics is growing, as more and more organizations are noting the many benefits it offers. Illena Armstrong explains why trends are now changing
Illena Armstrong Oct 15 2004 4:21PM Security
The fine art of patience

The fine art of patience

Gunter Ollmann explains why testing your system before it is ready is a time-wasting and expensive experience
Gunter Ollmann Oct 15 2004 4:21PM Security
The key to secure email

The key to secure email

James Angle explains the changes his hospital undertook in order to secure its confidential health data for HIPAA
Staff Writers Oct 15 2004 4:20PM Security
Industry’s voice up on Capitol Hill

Industry’s voice up on Capitol Hill

Some in the industry have accused the Cyber Security Industry Alliance of being just a ploy to curb government interference. But CSIA’s leader Paul Kurtz insists the group has much wider goals.
Marcia Savage Oct 15 2004 4:20PM Security
A new breed of criminal on the scene

A new breed of criminal on the scene

The Gartner IT summit has highlighted the need for user awareness in light of the rise of sinister attacks.
Ron Condon Oct 15 2004 4:19PM Security
A life-threatening security problem?

A life-threatening security problem?

Having a medical scan may no longer be the life-saving process we once thought it was.
John Sterlicchi Oct 15 2004 4:19PM Security
Facing up to the spate of menacing attacks

Facing up to the spate of menacing attacks

Illena Armstrong Oct 15 2004 4:18PM Security
Review: Flip2Disk

Review: Flip2Disk

This disaster recovery device from Amacom could be looked upon as nothing more that a USB hard drive with some back-up software thrown in for good measure. But this product is more than the sum of its parts.

René Millman Oct 14 2004 12:00AM Security
Be prepared to meet an iceberg

Be prepared to meet an iceberg

“When anyone asks me how I can best describe my experience in nearly forty years at sea, I merely say, uneventful. Of course there have been winter gales, and storms and fog and the like. But in all my experience, I have never been in any accident... or any sort worth speaking about. I have seen but one vessel in distress in all my years at sea. I never saw a wreck and never have been wrecked nor was I ever in any predicament that threatened to end in disaster of any sort.” E. J. Smith, 1907, Captain, RMS Titanic
Tom Keane Oct 13 2004 11:37AM Security

Log In

  |  Forgot your password?