Expert Advice

EXPERT ADVICE

Winning the Botnet Wars

Botnets embody the ultimate blended threat. Botnet code carries almost every conceivable form of malware -- from spyware to downloaders, rootkits, spam engines and more. To answer like with like, defenders must employ multiple layers of security. The good news is that time-honored techniques are sti...

Bandwidth aggregation products, such as WAN link controllers, enable a business to purchase multiple low-cost network connections and combine them to give it the total bandwidth required. The customer can then easily and flexibly add bandwidth as the organization's Internet usage increases. As an or...

EXPERT ADVICE

5 Highly Avoidable Network Management Bungles

Ask any IT organization to identify the No. 1 cause of network performance problems, and they'll probably point to high-profile events: denial-of-service attacks, computer viruses, fiber cuts, power outages or hardware failures. However, studies show that more than two-thirds of network issues are a...

EXPERT ADVICE

Your Log Records Have an Important Message for You

I spend a good deal of my time meeting existing and potential customers, and from that, I believe two things are clear: First, the Internet is now fundamental to the operations of both public and private organizations; second, those organizations are increasingly concerned with threats and risks due...

Cybersecurity is a young and immature field, but it cannot remain so for much longer. We are at a point in time when it is clear that the future will be dramatically different just on basis of technologies that are already in the pipeline. Faster communications, faster computers, mobility with sma...

EXPERT ADVICE

Back to Basics: 5 Things IT Could Do Better in 2010

Well, it's November again -- which means that it's just about time for this year's set of New Year's predictions. Every year around this time, everyone from antimalware companies to analyst firms line up to tell us about the top IT and security trends -- what they are and why we should care. This ...

EXPERT ADVICE

Network Forensics and Digital Time Travel

Network forensics is the capture, storage and analysis of network traffic. You might also hear the term referred to as "packet mining," "packet forensics," or "digital forensics." Regardless of the name, the concept is the same, with the objective to record every packet and the data it contains movi...

EXPERT ADVICE

Mobilization and the Big Security Opportunity

It seems like it was just yesterday that talking on a mobile phone made you cool. You were obviously important, walking around with the confidence that you could be reached at all times. Well, times have certainly changed. Roughly half the planet's population -- over 4.1 billion people -- now pay fo...

EXPERT ADVICE

Keeping Your Secrets Safe in a World Gone Social

Social networking continues to play an important part of our cultural growth, offering an accessible outlet for expression and a means to explore greater social interactions within a broader community. These platforms allow both anonymous and open communications with the world, giving us a voice an...

There's no debate about the need for centralized network monitoring. The potential benefits are numerous, including improved end-use productivity, network performance, application performance and security and compliance. There are three main approaches to network monitoring: Simple Network Managemen...

EXPERT ADVICE

Is the Internet Falling Apart?

How secure and dependable is the Internet? The Great Twitter Outage of 2009, which shocked the microblogging community and amused many other observers, called into question the reliability of Web-based communications and transaction capabilities that are easy to take for granted. According to Niels...

EXPERT ADVICE

Certified Ethical Hacker: Not Your Everyday Job

Computer infrastructure has become the foundation of businesses, governments, and militaries across the globe. Unfortunately, the onset of computer dependence has only opened a myriad of opportunities for cybercrime and potentially devastating consequences. Unlike in the past, when criminals would h...

EXPERT ADVICE

Managing the Long Tail of Digital Storage

"The IRS isn't interested in the show that flopped." If you're unfamiliar with that line, it's straight out of the Broadway musical The Producers, which was a notoriously over-the-top story about how to increase profit by making something, a product, that does not strike it big. It was a comedic yet...

EXPERT ADVICE

5 Keys for Full Recovery in the Cloud

While cloud computing is a familiar term, its definitions can vary greatly. So when it comes to online backup, the cloud is an important feature that can play a large role in securing and protecting during a disaster, which I like to refer to as "cloud recovery." In order to be worthy of this cloud ...

EXPERT ADVICE

The ‘Visual Yield’ of Information Security

Over the holiday weekend, a family friend introduced us to a great concept we hadn't heard before: The concept of "visual yield." It's a concept that I think anybody who's ever been involved in a home improvement project can understand and appreciate -- and it has more to do with information securi...

Technewsworld Channels