Network & Perimeter

The Latest News

  • Article

    Who's Hijacking Internet Routes?

    Attacks Increase, But There's No Easy Fix in Sight By Mathew J. Schwartz
    Who's Hijacking Internet Routes?

    Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.

  • Article

    Web Attacks: How to Improve Defense

    Akamai's Mike Smith on How to Spot, Respond to Warning Signs By Information Security Media Group
    Web Attacks: How to Improve Defense

    Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.

  • Interview

    Web Based Attack Trends and How to Leverage Information Sharing

    Akamai's Mike Smith on How to Spot, Respond to Warning Signs By Information Security Media Group
    Web Based Attack Trends and How to Leverage Information Sharing

    Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.

  • Interview

    ForeScout CEO on Internet of Things

    T. Kent Elliott Addresses the Next Frontier in Network Security By Howard Anderson
    ForeScout CEO on Internet of Things

    As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.

  • Blog

    Protecting the Perimeter From the Cloud

    Defending Against Hackers Who Automate Monitoring of Targets By Jonathan Trull
    Protecting the Perimeter From the Cloud

    More organizations are looking to "continuous security" to monitor their ever-expanding network perimeters. But what are the critical elements of effectively using this approach?

More news...

Webinars

More webinars...
ARTICLE Prison Term for ID Theft at Hospital

The sentencing of a former Alabama hospital worker to two years in prison for his role in an ID...

Latest Tweets and Mentions

ARTICLE Prison Term for ID Theft at Hospital

The sentencing of a former Alabama hospital worker to two years in prison for his role in an ID...

The ISMG Network