Information security spending to grow almost 10% in ANZ: Gartner
Detection, response and privacy drive demand for security products and services
Detection, response and privacy drive demand for security products and services
Hosted service vendor Telco Systems is hoping to make it easier for businesses to buy cloud-based routers and firewalls, but the company first has to convince service providers it's a good idea.
The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.
A new tool called the Modern Honey Network (MHN) aims to make deploying and managing large numbers of honeypots easier so that enterprises can adopt such systems as part of their active defense strategies.
Attackers are increasingly abusing devices configured to publicly respond to SNMP (Simple Network Management Protocol) requests over the Internet to amplify distributed denial-of-service attacks.
A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more serious attacks, according to security researchers from Cisco Systems.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.
Following up on customer feedback from U.S. intelligence agencies, VMware security systems provider HyTrust has updated its virtual security appliance so actions taken by administrators can be delayed until external approval for that action is granted.
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from security vendor FireEye.
Despite its leadership position in most enterprise security product areas, Cisco faces a number of technological and competitive challenges to stay out in front.
F5 is pushing hard into the security space as cyber attacks increasingly target the application layer, an F5 official said at the vendor’s Agility Forum on the Sunshine Coast.
In the <a href="http://www.networkworld.com/news/2011/111611-smb-security-survey-253083.html">security</a> popularity contest of the moment, <a href="http://www.networkworld.com/subnets/cisco/">Cisco</a> and Juniper are down and Palo Alto Networks and Check Point are up when it comes to network firewalls, according to one research firm.
Tired of regulators from three or four federal agencies auditing your network security compliance every year? A congressional task force recommends a super-standard that would cut the number of annual audits back to just one.
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.
Network security pros think use of social media at work is good for business, but also creates risks they don't have the tools to address, according to a Ponemon Institute survey.