News

In our tests of five leading network intrusion-detection systems and the popular open source Snort, performance was spotty during baseline testing and degraded by as much as 50% on some products ...
An intrusion detection software basically checks for changes made by unwanted programs that could be injected into your systems by cybercriminals. All of them study the data packets—incoming and ...
Network-based intrusion-detection systems (IDS) are an integral component of a layered IT security strategy. As October is National Cyber Awareness Month, if your overall security system doesn’t ...
There have been many cases reported in both trade and national press recently about the increasing threat of cyber attacks, and the methodology employed ...
In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...