50 Results for:IP67

  • Sort by: 

Vulnerable websites make up half of the internet's top sites

By Madelyn Bacon 16 Dec 2016

News roundup: A report finds nearly half the internet is filled with vulnerable websites. Plus, SWIFT confirms more hacks, Amit Yoran steps down from RSA and more. Read More

Network security monitoring using transaction data

By Richard Bejtlich 19 Apr 2009

Using transaction data -- or application-specific traffic data -- in network security monitoring can give you a new line of defense. Read More

How Turkish mobile operators are helping the vast Syrian refugee population to help themselves

By Andy Favell 22 Mar 2018

Turkish mobile network operators are designing services that will help Syrian refugees make their lives in the country Read More

How the top cloud collaboration tools stack up

By Andrew Froehlich 29 Jan 2018

Team collaboration apps have saturated the UC market. See how the leading products compare on calling features, video conferencing support, pricing and other criteria. Read More

A CISO's introduction to enterprise data governance strategy

By Francoise Gilbert 27 Jan 2015

Every enterprise must have a viable strategy for protecting high-value data. See if your plan aligns with Francoise Gilbert's advice on top priorities to consider when defining data governance plans. Read More

Perform a PaaS pricing comparison for public cloud

By Mike Pfeiffer 01 Dec 2016

When choosing a platform, enterprises need to focus on features and prices for Azure, Google and AWS. Take a look under the hood before you take it for a spin. Read More

Creating a quorum disk and fencing for Linux high availability nodes

By Sander van Vugt 23 Dec 2013

The quorum disk and fencing on a Linux high availability cluster let its nodes know when they are operational and shut them off if they are not. Read More

Snort command line output modes

23 May 2007

Snort command line output modes, as described here, are usually selected for testing purposes or demonstrations. Read More

Secure Cisco routers against IOS flaw attack

By David Davis 16 Aug 2007

Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this ... Read More

Most antispam technologies get failing grade

By Robert Westervelt 30 Jul 2007

An independent study finds that many enterprises are not satisfied with traditional antispam technologies. Read More