firewalls - News, Features, and Slideshows

News

  • Tool aims to help enterprise IT manage 'honeypot' hacker decoys

    A new tool called the Modern Honey Network (MHN) aims to make deploying and managing large numbers of honeypots easier so that enterprises can adopt such systems as part of their active defense strategies.

    Written by Lucian Constantin21 June 14 02:53
  • DDoS attacks using SNMP amplification on the rise

    Attackers are increasingly abusing devices configured to publicly respond to SNMP (Simple Network Management Protocol) requests over the Internet to amplify distributed denial-of-service attacks.

    Written by Lucian Constantin24 May 14 04:09
  • NIST subjects draft cybersecurity framework to more public scrutiny

    Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.

    Written by Joab Jackson29 Aug. 13 20:59
  • HyTrust enforces two-person approval for VMware security

    Following up on customer feedback from U.S. intelligence agencies, VMware security systems provider HyTrust has updated its virtual security appliance so actions taken by administrators can be delayed until external approval for that action is granted.

    Written by Joab Jackson26 Aug. 13 04:04
  • Chinese hacker group behind New York Times attack returns with updated tools

    The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from security vendor FireEye.

    Written by Lucian Constantin12 Aug. 13 15:07
  • To be breached is human

    While the security industry likes to focus on application security and system vulnerabilities, as well as the effectiveness (or lack thereof) of the tools used to defend IT systems -- the vulnerabilities that create real-world breaches are often created by the wetware between our ears -- not defective tools.

    Written by George V. Hulme21 May 11 06:06
  • Security on a Shoestring Budget

    For many, security is like going to the dentist--you have to deal with it, but that doesn't mean you have to go willingly, or like it once you get there. One of the main problems with IT security, though, comes down to money. While new servers or PCs can be justified as an investment, security is seen simply as an expense and a headache. But, what if you could protect your network and your PCs without breaking the bank?

    Written by Tony Bradley09 March 11 02:30
  • Organising sensitive data in the cloud

    There's a tremendous buzz today about cloud computing, but before outsourcing your critical business systems to the cloud let's review some security concerns.

    Written by Gregory Machler31 Aug. 10 03:25