- Welcome Guest
- Sign In
Demand is high for a super system that can promise protection from external threats while organizations' networks, data and software applications become increasingly interconnected. Since Cisco Systems coined the term and released its first "network access control" system in 2003, interest in NACs h...
For the second time this year, hackers have victimized the University of Missouri. The names and Social Security numbers of 22,396 current or former students who were employed by UM during 2004 may have been compromised, according to university officials. The hacker or hackers reportedly gained acce...
Security threats paint a constantly evolving landscape, and there is no end in sight in terms of threats that keep appearing. Enterprises have survived through extraordinary cycles of security threats, including the 2003 "summer of worms"; the 2004 proliferation of DDoS-based cyber extortion of onli...
Wireless networking continues to make inroads in metropolitan and rural areas across the U.S. as the development of 802.1x technologies and associated standards forges ahead. Wireless broadband and VoIP have both gained momentum and are moving inexorably forward. It's now possible to connect to the ...
As the nature of Internet threats has morphed, IT systems professionals and security providers have adapted their response tactics. Increasingly, organizations are developing comprehensive security strategies and implementing a variety of online and on-demand security applications and services acros...
It's a sad fact of life for today's information-driven organizations that the nature of security threats is continuously shifting and evolving. Intrusion mechanisms such as worms, Trojans and rootkit exploits continually evolve into more-developed forms, and wax and wane in terms of number and frequ...
Network security was a big issue a decade ago. Now, ten years of technology later, it continues to be a top priority and it appears that it will be so ten years from now as well. That's because as IT security firms learn more about the tactics of hackers, crackers and malicious code writers, the lat...
Most companies depend exclusively on perimeter defenses to protect their computer networks from intruders, a practice that appears to be more sieve than stone wall, according to a survey released yesterday by Vernier Networks, a network access management firm in Mountain View, Calif. Surveyors found...