If you are plugged into the security grapevine, you likely know that Gartner caused quite a stir when it issued a report in June stating that intrusion-detection systems will be obsolete by 2005. The ...
Using a layered approach to network security that won’t overwhelm you with false alerts takes strategic planning. Here are some steps to follow for the best results. 1. Know your network. Gather as ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
IT security managers say the dangers posed by computer worms and hacker attacks have compelled them to shift defenses from passively monitoring their networks to actively blocking attacks, even though ...
A variety of intrusion detection systems (IDS) are on the market, ranging from enterprise-level, managed network monitoring solutions to simple on-the-host logging systems. There is also a distinction ...
IDS (intrusion detection system) products have been undergoing a renaissance of late. By incorporating application-layer packet-filtering capabilities, they are evolving to provide more than just ...