Network Security Monitoring and Analysis
Top Stories
-
Tip
07 Nov 2018
Using AI, machine learning in networking to improve analytics
The barrage of alerts modern network analytics tools create is problematic, but the capabilities advanced tech like AI provides can help ease the burden to network operations. Continue Reading
-
Tip
22 Aug 2018
Find network security vulnerabilities by assessing risk
IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. Continue Reading
-
News
14 Aug 2018
Array bolsters throughput, security in NFV appliance
Array Networks has added support for 40 GbE interfaces in its NFV appliance. The AVX hardware also has higher throughput for encrypted traffic. Continue Reading
-
Feature
02 Jul 2018
Network security issues top the list of enterprise priorities
A network manager's list of concerns is always long. But given the rise of deadly threats, security tops the list, followed by SDN, IoT and edge computing. Continue Reading
-
News
20 Apr 2018
Router security options advised following U.S. hacker alert
A rare government alert that Russian hackers are targeting routers in the United States and the United Kingdom has security experts debating router security options. Continue Reading
-
News
04 Apr 2018
Integrate endpoint management systems for better security
This week, networking bloggers discuss combining endpoint management systems with security, thorny wireless devices and the logic of an IXP atop a VXLAN infrastructure. Continue Reading
-
News
03 Apr 2018
Juniper Security Director helped by Cyphort analytics
Cyphort analytics is now a part of Juniper Security Director. Juniper has introduced integration between the policy manager and the Cyphort security software acquired last year. Continue Reading
-
News
29 Mar 2018
SD-WAN routing changes branch dynamics
This week, bloggers look into the changes wrought in the branch by SD-WAN routing, endpoint security tools and Microsoft's new SONiC open source software. Continue Reading
-
News
01 Mar 2018
Cisco tracks growing role of machine learning, AI in cybersecurity
Cisco highlights the growing role of automation, machine learning and AI in cybersecurity, increasing the target of investments by IT departments working to mitigate malware. Continue Reading
-
News
23 Feb 2018
What are the top information security objectives for CISOs?
Bloggers delve into CISO information security objectives, Juniper's new product release and how self-sufficient networking teams should try to be in an area of increasing complexity. Continue Reading
-
News
16 Feb 2018
Cisco revenue turns positive, as software, security sales up
Cisco revenue grew last quarter for the first time in more than two years, due, in part, to rising software sales. But analysts cautioned Cisco could still fall back into a slump. Continue Reading
-
News
16 Jan 2018
Cybersecurity skills shortage continues to worsen
This week, bloggers explore the cybersecurity skills shortage, the challenges of deploying edge computing and how best to mitigate Meltdown in a software-centric environment. Continue Reading
-
News
11 Jan 2018
No need to rush network patching for Spectre and Meltdown
Security experts said Spectre and Meltdown pose a low risk to corporate networking gear. Nevertheless, vendor patches should be applied following thorough testing. Continue Reading
-
News
04 Jan 2018
Cisco ETA security integrated into Catalyst, ASR, ISR
Cisco has integrated Encrypted Traffic Analytics into Catalyst switches and ASR and ISR routers. Cisco ETA searches encrypted traffic for malware activity. Continue Reading
-
News
13 Dec 2017
SD-WAN a tool for combining networks, engineer says
When your company acquires another, combining networks can be a chore. But SD-WAN could ease the pains associated with integrating disparate topologies. Continue Reading
-
News
16 Nov 2017
LiveAction software focuses on provisioning resources
Bloggers look into LiveAction software aimed at provisioning resources, the threat posed by the cybersecurity skills shortage and using Linux for data center switches. Continue Reading
-
Answer
28 Aug 2017
How should IT manage connected devices?
As IT teams become tasked to manage connected devices more often, what steps need to be taken to avoid performance and security-related problems? Continue Reading
-
News
28 Jul 2017
2017 cybersecurity trends at the Black Hat conference
This week, bloggers look into 2017 cybersecurity trends leading up to the Black Hat conference, Movidius deep learning and Mist's approach to WLAN. Continue Reading
-
News
21 Jul 2017
SaaS SIEM offers enterprise networks refined analytics
This week, bloggers explore SaaS SIEM, applications as drivers of hybrid cloud, and the benefits and drawbacks of integrated systems. Continue Reading
-
News
14 Jun 2017
Enterprises seek operational insight from network analytics
This week, bloggers look into operational insight from network analytics, vulnerabilities in the wake of WannaCry and slow 25 GbE switch adoption. Continue Reading
-
Answer
08 Jun 2017
How to cut false security, malware alerts in hybrid cloud
The bad news: IT teams are deluged by false security and malware alerts with their hybrid clouds. The good news: New tools are here to help. Continue Reading
-
News
17 May 2017
SNAS open source networking project captures BGP telemetry
This week, bloggers look into the open source networking option SNAS, SIEM for enterprises and automating device configurations. Continue Reading
-
News
01 May 2017
Nyansa premieres new Voyance network analytics tools
This week, Nyansa premieres new Voyance network analytics tools, espionage takes off as a security threat and the midmarket struggles with cybersecurity. Continue Reading
-
News
09 Mar 2017
New York cybersecurity regulations could have big impact nationwide
This week, bloggers assess the effect of New York cybersecurity regulations, whether the network edge will grow in importance and how customers create complexity. Continue Reading
-
News
11 Nov 2016
President-elect silent on federal cybersecurity policies
This week, bloggers look ahead to the new administration's cybersecurity policies, how to close gaps in app delivery management and the best way to optimize data centers. Continue Reading
-
News
26 Oct 2016
Why one Gartner analyst is 'not sorry' about DDoS attack program
This week, bloggers look into the DDoS attack program that leveraged IoT devices, Webscale's cloud-resource-allocation platform and alternative views of digital transformation. Continue Reading
-
News
24 Aug 2016
IT professionals aim to operationalize threat intel in the enterprise
This week, networking bloggers look into operationalizing threat intel, Google Fiber's deployment and home lab spending. Continue Reading
-
News
02 Jun 2016
SS8 takes new approach to cyberthreat intelligence
SS8 launches BreachDetect, a Layer 7 'time machine' for breach detection in enterprises and a new addition to the cyberthreat intelligence marketplace. Continue Reading
-
News
26 Apr 2016
Juniper provides container firewall to banks, cloud
Juniper Networks has added a container firewall to its SRX portfolio. The latest product provides container protection for banks, carriers and cloud providers. Continue Reading
-
Buyer's Guide
15 Dec 2015
Network security basics: A Buyer's Guide
Getting network security basics right is critical. This SearchNetworking Buyer's Guide helps you purchase the best products for your enterprise. Continue Reading
-
Feature
16 Nov 2015
Blue Coat ProxySG: Secure Web gateway overview
With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading
-
Feature
09 Nov 2015
Palo Alto WildFire: Malware sandbox product overview
Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading
-
News
29 Oct 2015
Latest Cisco acquisitions touch analytics, security, cloud
Cisco acquisitions of ParStream, Lancope and 1 Mainstream reflect the company's view of how networking is evolving. Continue Reading
-
Feature
04 Aug 2015
Enterprise IoT security: Is the sky truly falling?
Horror stories in the consumer market have cast a shadow over the Internet of Things. Are enterprise IoT deployments even more at risk? Continue Reading
-
Answer
25 Mar 2015
What are the secrets to SIEM deployment success?
Many organizations deploy security information and event management systems without the proper planning and therefore can't reap the proper rewards. Expert Kevin Beaver offers tips for a successful implementation. Continue Reading
-
Tip
23 Feb 2015
Final five considerations when evaluating intrusion detection tools
Before making an investment in an intrusion detection and prevention system, be sure to read this list of five final considerations to keep in mind during intrusion detection system evaluation. Continue Reading
-
Tip
23 Feb 2015
Introduction to intrusion detection and prevention technologies
Intrusion detection and preventions systems can be critical components to an enterprise's threat management strategy. Learn the history behind the technologies and why they are so important. Continue Reading
-
Tip
20 Feb 2015
Evaluating enterprise intrusion detection system vendors
Selecting an intrusion detection and prevention system vendor can be a time-consuming task. Get help evaluating vendors and products with this list of must-ask questions. Plus, a comprehensive vendor list. Continue Reading
-
Tip
17 Feb 2015
Benefits of the Cisco OpenSOC security analytics framework
Cisco's open source security analytics framework aims to help enterprises address visibility and incident management challenges. Expert Kevin Beaver discusses OpenSOC and what to consider when integrating it into an enterprise security strategy. Continue Reading
-
Tip
02 Dec 2014
Understanding security flaws in IPv6 addressing schemes
Expert Fernando Gont explains why underlying characteristics of IPv6 address-generation schemes may enable nodes to be targeted in IPv6 address-scanning attacks. Continue Reading
-
Photo Story
04 Jan 2012
Mobile network management applications offer monitoring on the go
As smartphone and tablet devices in the enterprise grow, vendors are developing mobile network management apps for iOS and Android, offering accessible views into the network. Continue Reading
-
News
23 Sep 2010
Next-generation firewalls not ready to replace all legacy firewalls
Application-aware firewalls enhance network security by offering deeper visibility, but enterprises will hang on to old-style firewalls. Continue Reading
-
Feature
10 Apr 2006
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN. Continue Reading
-
Feature
10 Apr 2006
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized by type of threat, and mapped to associated hacker methods and tools. Continue Reading
-
Tip
15 Mar 2006
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. Continue Reading
-
Tip
02 Dec 2005
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. Continue Reading
-
Tip
31 Oct 2005
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail through an intermediate mail server or reroute your users to an exact replica of a popular Web site, where their keystrokes, including account names and passwords, are captured. In this tip, Cricket Liu provides a checklist of measures you can take to secure your DNS infrastructure. Continue Reading
-
Tip
11 Oct 2005
Understanding the differences between IDS and IPS
We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same. Learn the differences between IDS and IPS, and which is right for your network, with this expert tip. Continue Reading
-
Tip
27 Sep 2005
The network administrator's guide to forensic first response
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the investigation. The most critical concern, then, is to create the most conducive environment possible for the forensic examiner. This tip will discuss vital considerations for the administrator acting in a first responder's role to maintain the integrity of evidence and accountability. Continue Reading
- Answer 08 Sep 2005
-
Feature
18 May 2005
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
-
Feature
14 Feb 2005
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
-
News
23 Jan 2005
Security hole in Cisco IOS
A vulnerability in Cisco's Internetwork Operating Software (IOS) could be exploited for a denial-of-service attack. Continue Reading
-
News
20 Jan 2005
Spyware becoming big network headache
Network managers report spyware incidents rising sharply in recent months and say it could soon qualify as the top security headache in the corporate world. Continue Reading
-
News
17 Jan 2005
Virus spreading via tsunami e-mail
A mass e-mail posing as a plea for aid to help the victims of last month's Asian tsunami disaster is actually a vehicle for spreading a computer virus, according to Web security firm Sophos. Continue Reading
-
News
11 Jan 2005
Networking threat gets personal
Sinister network hackers aren't nearly as dangers as disgruntled employees who steal data or accidentally expose it. However, a new generation of products is emerging to address those concerns. Continue Reading
-
News
03 Jan 2005
Flaws affect Symantec's Nexland appliances
Vulnerabilities discovered in Symantec's Firewall/VPN and Gateway Security products last fall also affect the company's Nexland appliances. Continue Reading
- Answer 12 Oct 2004
-
Tip
24 Sep 2004
Preventing Layer 2 security threats
Layer 2 switched environments, typically found in enterprise customer wiring closets, can be easy targets for network security attacks. Continue Reading
- Answer 31 Aug 2004
- Answer 25 Jun 2004
-
News
19 Jan 2004
Bagle-A worm moving quickly
The latest mass-mailing worm carries an expiration date and opens an unassigned port waiting for further instructions from its author. Continue Reading