network

Review: Sunbelt Network Security Inspector

Review: Sunbelt Network Security Inspector

This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn Jun 1 2004 12:00AM Security
SMEs slow to network: IDC

SMEs slow to network: IDC

Staff Writers Jun 1 2004 12:00AM Networking
New standard helps companies trust network connections

New standard helps companies trust network connections

A security specification currently in the works strives to help companies safeguard their networks from worms, viruses, software vulnerabilities and denial of service attacks by allowing users to enforce security policies that stop untrusted systems from connecting to their infrastructures.
Illena Armstrong May 10 2004 8:51PM Security
Network Associates sells Sniffer, changes name to McAfee

Network Associates sells Sniffer, changes name to McAfee

Network Associates said it is selling its unprofitable Sniffer network management and analysis product line as part of a sudden restructuring and is changing its name to McAfee.
Steven Burke , Byron Connolly Apr 23 2004 12:00AM Security
Network Associates sells Sniffer line, changes name

Network Associates sells Sniffer line, changes name

Network Associates Thursday announced the sale of its Sniffer network analyzer product line and said the company will change its name to McAfee.
Marcia Savage Apr 22 2004 11:55PM Security
Department of Homeland Security to buy secure data network

Department of Homeland Security to buy secure data network

The US Department of Homeland Security (DHS) is set to pay $350 million for the implementation of a secure data network.
Dan Ilett Apr 13 2004 3:39PM Security
BT to protect NATO network

BT to protect NATO network

The North Atlantic Treaty Organisation (NATO) is to use a BT centrally managed service to secure its networks.
Dan Ilett Mar 24 2004 11:57AM Security
Review: Fundamentals of Network Security

Review: Fundamentals of Network Security

Yet again Cisco has churned out an over priced book for one of its courses and filled it out with acronyms and confusing explanations. Nice diagrams though.

Dan Ilett Mar 23 2004 12:00AM Security
Royal Bank of Scotland to secure transport ticket network

Royal Bank of Scotland to secure transport ticket network

The Royal Bank of Scotland is to provide a security component of the Integrated Transport Smartcard Organisation’s (ITSO) ticketing infrastructure.
Dan Ilett Feb 26 2004 3:35PM Security
Network IDS Shortcomings: Has NIDS Reached the End of the Road?

Network IDS Shortcomings: Has NIDS Reached the End of the Road?

The intrusion detection system (IDS) jumped from research labs and universities into being a standard information security safeguard in just several years.
Anton Chuvakin Jan 19 2004 10:48AM Security
Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Internet usage is growing at an accelerating pace.
Joseph Vaughn-Perling Jan 16 2004 5:18PM Security
SECURITY LIBRARY: CERT Guide to System and Network Security

SECURITY LIBRARY: CERT Guide to System and Network Security

CERT (www.cert.org) has released a comprehensive guide for protecting information systems.
Anton Chuvakin Jan 16 2004 1:04PM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
Securing the Network Edge

Securing the Network Edge

In the evolution of communications networks, the lines between computing and networking have become less than clear.
Dan Taylor Jan 16 2004 9:49AM Security
Money Alone Won't Solve Network Security Issues

Money Alone Won't Solve Network Security Issues

The combination of terrorism fears and high-profile virus, worm and denial-of-service attacks, along with ongoing break-in revelations, has given new urgency to network and application security issues.
Taher Elgamal Jan 15 2004 2:12PM Security
Network Intrusion Detection 3rd edition

Network Intrusion Detection 3rd edition

The next incarnation of the excellent network intrusion detection manual from SANS's Stephen Northcutt and Judy Novak is here.
Stephen Northcutt Jan 15 2004 12:28PM Security
Centrally Managed Network Security: Hope or Reality?

Centrally Managed Network Security: Hope or Reality?

Ask any IT professional to predict the future of computer networking and you will get different answers.
Dan Thomsen Jan 15 2004 11:40AM Security
Network vulnerabilities

Network vulnerabilities

Basic network security issues have changed very little over the past decade.
Peter Crowcombe Jan 15 2004 10:23AM Security
Securing the Last Unprotected Area of the Network

Securing the Last Unprotected Area of the Network

Just how secure is your network?
James Teel Jan 15 2004 9:57AM Security
From Business Policy to Network Policy

From Business Policy to Network Policy

At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House Jan 14 2004 3:40PM Security

Log In

  |  Forgot your password?