Information Security Leader, Author, Instructor and Speaker

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Enterprise UTM security: The best threat management solution? TAGS: | | If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information …Continue reading →

Default utility Image

Maximizing IDS/IPS implementations TAGS: | | Anomaly detection is an important part of any layered security solution. Intrusion detection, intrusion prevention and log analysis systems can …Continue reading →

Default utility Image

Enterasys’s Dynamic Intrusion Response TAGS: | | Enterasys Networks’ development of its Dynamic Intrusion Response (DIR) platform leverages its strength as a network infrastructure products company and …Continue reading →

Default utility Image

Wireless LAN intrusion detection TAGS: | | Most security administrators are familiar with the capabilities of modern intrusion-detection systems and the benefits of incorporating this technology into …Continue reading →

Default utility Image

Intrusion detection basics TAGS: | Intrusion-detection systems (IDS) are a critical component of any security infrastructure. These hardware and/or software devices monitor a network for …Continue reading →

Default utility Image

Evaluating and tuning an intrusion-detection system TAGS: | The vast majority of intrusion-detection systems (IDS) available today allow system administrators some degree of flexibility in configuring the sensitivity …Continue reading →

Default utility Image

Snort – The poor man’s intrusion-detection system TAGS: | Is intrusion detection the missing piece in your information security puzzle? Many organizations evaluate products like ISS RealSecure and the …Continue reading →