Blog Posts Tagged with "Monitoring"


Implementing Bidirectional Forwarding Detection

January 13, 2011 Added by:Stefan Fouant

Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...

Comments  (0)


Inspector General's Audit Finds GSA Security Lapses

January 07, 2011 Added by:Bill Gerneglia

The federal Office of the Inspector General found significant failings in the General Services Administration’s IT security systems and procedures in a December review of the agency, including configuration management, audit logging, monitoring, and encryption of data on agency laptops...

Comments  (0)


Pentagon Tightens Data Security Protocols

January 02, 2011 Added by:Headlines

At issue is how best to classify material in an effort to prevent further breaches, while also maintaining post-9/11 efforts to increase information sharing efforts between multiple government agencies charged with defending the nation from future terrorist attacks...

Comments  (1)


Complete PCI DSS Log Review Procedures Part 3

December 13, 2010 Added by:Anton Chuvakin

Many pieces of network infrastructure such as routers and switches are designed to log to an external server and only preserve a minimum (or none) of logs on the device itself. Thus, for those systems, centralizing logs is most critical...

Comments  (0)


The Anatomy of a Breach

December 13, 2010 Added by:PCI Guru

Wal-Mart has a robust control environment. However, what this breach shows is that even with such an environment, a breach can still occur. That is not to say that Wal-Mart did not make mistakes and it is those mistakes that I want to point out so that we can all learn...

Comments  (0)


Supercookies: What Websites Know About You

December 11, 2010 Added by:Robert Siciliano

With numerous privacy watchdogs taking this kind of advertising offensively, and the Obama administration now stepping in, we will surely see standards in this kind of marketing practice appear over the next few years...

Comments  (0)


Is a DLP System a Fit For Your Organization?

December 09, 2010 Added by:Robb Reck

DLP can move a company from assuming they know where their data is, and that it's being used appropriately, to a place where they know exactly where their sensitive is, who is using it, and where they are sending it...

Comments  (0)


Defending Your Network: Detection versus Prevention

November 17, 2010 Added by:Robb Reck

Our prevention systems cannot block every type of malicious activity, and we should not expect them to. Implementing high quality detective technologies gives us the kind of visibility into what's going on in our network that we can never have without them...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »