Intrusion detection systems News
March 14, 2017
RSAC 2017: With malware-detecting software increasingly coming under fire for vulnerabilities, find out what the experts had to say about the future of the antivirus industry.
November 16, 2016
Researchers discover Italian-sourced Android spyware linked to Hacking Team, but it could be the work of another surveillance software vendor.
October 06, 2016
A report claims Yahoo built custom software under order of the U.S. government to perform secret surveillance on all incoming emails, though questions about the program remain.
August 17, 2016
A PGP short ID collision attack on the creator of Linux brings to light a flaw that experts have known about for years with short ID keys.
Intrusion detection systems Get Started
Bring yourself up to speed with our introductory content
In lieu of installing all apps directly on users' desktops and mobile devices, IT has a plethora of options to deliver applications -- desktop and application virtualization, desktop as a service, web apps and hybrid strategies. Each method comes with advantages and drawbacks when it comes to security, compatibility, cost and development complexity. This month's cover story of Access magazine delves into these issues to help you figure out what's best for your different applications.
In a column, our enterprise desktop expert explains when it's better to deliver full desktops versus single applications. And along with determining how to deliver applications, it's critical to focus on the back-end infrastructure. Another column this month explores what to consider for the third-party systems behind mobile specifically. The Deep Dive looks at mobile threat detection technology and why it hasn't reached critical mass yet. Finally, the new App Spotlight shines on Slack, a growing option for enterprise collaboration.Continue Reading
EMM configurations can help safeguard the enterprise from attacks, but mobile threat detection tools take a different approach to actively pinpoint security issues. Continue Reading
DDoS prevention is an urgent security need for any company. Learn how to select the products and services that will best strengthen your defense against denial of service attacks. Continue Reading
Evaluate Intrusion detection systems Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Secure Designs encountered Seceon while on the hunt for the right SIEM tool. Seceon's Open Threat Management fit the bill and paved the way to a strategic partnership. Continue Reading
Expert Dan Sullivan takes a look at how the IBM QRadar Security Intelligence Platform collects data from multiple sources so as to provide a comprehensive view of IT security. Continue Reading
Expert Dan Sullivan explores how the Cybereason Detection and Response Platform uses big data security analytics to identify malicious events and better secure enterprises. Continue Reading
Manage Intrusion detection systems
Learn to apply best practices and optimize your operations.
IT systems have changed, development processes have changed and even the business's customers' habits have changed. Why hasn't IT security? Continue Reading
The IT pro's job is to ensure the best network security network performance both. Our guide provides solid steps to take right now to achieve both in this age of mobile and the internet of things. Continue Reading
Network security alerts are high in number and low in accuracy. Expert Kevin Beaver explains strategies security professionals can develop to overcome these obstacles to improving security. Continue Reading
Problem Solve Intrusion detection systems Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The SWIFT network has increasingly been abused by cybercriminals to carry out bank fraud and theft. Expert Michael Cobb explains possible ways to boost security. Continue Reading
In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. Learn how to update your IR process. Continue Reading
Ransomware mitigation strategies should be a top business priority as the malware becomes increasingly common. But sometimes, paying up might be the only option. Continue Reading