- Welcome Guest
- Sign In
Botnets embody the ultimate blended threat. Botnet code carries almost every conceivable form of malware -- from spyware to downloaders, rootkits, spam engines and more. To answer like with like, defenders must employ multiple layers of security. The good news is that time-honored techniques are sti...
Bandwidth aggregation products, such as WAN link controllers, enable a business to purchase multiple low-cost network connections and combine them to give it the total bandwidth required. The customer can then easily and flexibly add bandwidth as the organization's Internet usage increases. As an or...
Ask any IT organization to identify the No. 1 cause of network performance problems, and they'll probably point to high-profile events: denial-of-service attacks, computer viruses, fiber cuts, power outages or hardware failures. However, studies show that more than two-thirds of network issues are a...
I spend a good deal of my time meeting existing and potential customers, and from that, I believe two things are clear: First, the Internet is now fundamental to the operations of both public and private organizations; second, those organizations are increasingly concerned with threats and risks due...
Cybersecurity is a young and immature field, but it cannot remain so for much longer. We are at a point in time when it is clear that the future will be dramatically different just on basis of technologies that are already in the pipeline. Faster communications, faster computers, mobility with sma...
Well, it's November again -- which means that it's just about time for this year's set of New Year's predictions. Every year around this time, everyone from antimalware companies to analyst firms line up to tell us about the top IT and security trends -- what they are and why we should care. This ...
Network forensics is the capture, storage and analysis of network traffic. You might also hear the term referred to as "packet mining," "packet forensics," or "digital forensics." Regardless of the name, the concept is the same, with the objective to record every packet and the data it contains movi...
It seems like it was just yesterday that talking on a mobile phone made you cool. You were obviously important, walking around with the confidence that you could be reached at all times. Well, times have certainly changed. Roughly half the planet's population -- over 4.1 billion people -- now pay fo...
Social networking continues to play an important part of our cultural growth, offering an accessible outlet for expression and a means to explore greater social interactions within a broader community. These platforms allow both anonymous and open communications with the world, giving us a voice an...
There's no debate about the need for centralized network monitoring. The potential benefits are numerous, including improved end-use productivity, network performance, application performance and security and compliance. There are three main approaches to network monitoring: Simple Network Managemen...
How secure and dependable is the Internet? The Great Twitter Outage of 2009, which shocked the microblogging community and amused many other observers, called into question the reliability of Web-based communications and transaction capabilities that are easy to take for granted. According to Niels...
Computer infrastructure has become the foundation of businesses, governments, and militaries across the globe. Unfortunately, the onset of computer dependence has only opened a myriad of opportunities for cybercrime and potentially devastating consequences. Unlike in the past, when criminals would h...
"The IRS isn't interested in the show that flopped." If you're unfamiliar with that line, it's straight out of the Broadway musical The Producers, which was a notoriously over-the-top story about how to increase profit by making something, a product, that does not strike it big. It was a comedic yet...
While cloud computing is a familiar term, its definitions can vary greatly. So when it comes to online backup, the cloud is an important feature that can play a large role in securing and protecting during a disaster, which I like to refer to as "cloud recovery." In order to be worthy of this cloud ...
Over the holiday weekend, a family friend introduced us to a great concept we hadn't heard before: The concept of "visual yield." It's a concept that I think anybody who's ever been involved in a home improvement project can understand and appreciate -- and it has more to do with information securi...