Blog Posts Tagged with "Monitoring"

065b7cfbbb03ac9d18cbf5ed0615b40a

Implementing Bidirectional Forwarding Detection

January 13, 2011 Added by:Stefan Fouant

Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Inspector General's Audit Finds GSA Security Lapses

January 07, 2011 Added by:Bill Gerneglia

The federal Office of the Inspector General found significant failings in the General Services Administration’s IT security systems and procedures in a December review of the agency, including configuration management, audit logging, monitoring, and encryption of data on agency laptops...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Tightens Data Security Protocols

January 02, 2011 Added by:Headlines

At issue is how best to classify material in an effort to prevent further breaches, while also maintaining post-9/11 efforts to increase information sharing efforts between multiple government agencies charged with defending the nation from future terrorist attacks...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

Complete PCI DSS Log Review Procedures Part 3

December 13, 2010 Added by:Anton Chuvakin

Many pieces of network infrastructure such as routers and switches are designed to log to an external server and only preserve a minimum (or none) of logs on the device itself. Thus, for those systems, centralizing logs is most critical...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The Anatomy of a Breach

December 13, 2010 Added by:PCI Guru

Wal-Mart has a robust control environment. However, what this breach shows is that even with such an environment, a breach can still occur. That is not to say that Wal-Mart did not make mistakes and it is those mistakes that I want to point out so that we can all learn...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Supercookies: What Websites Know About You

December 11, 2010 Added by:Robert Siciliano

With numerous privacy watchdogs taking this kind of advertising offensively, and the Obama administration now stepping in, we will surely see standards in this kind of marketing practice appear over the next few years...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Is a DLP System a Fit For Your Organization?

December 09, 2010 Added by:Robb Reck

DLP can move a company from assuming they know where their data is, and that it's being used appropriately, to a place where they know exactly where their sensitive is, who is using it, and where they are sending it...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Defending Your Network: Detection versus Prevention

November 17, 2010 Added by:Robb Reck

Our prevention systems cannot block every type of malicious activity, and we should not expect them to. Implementing high quality detective technologies gives us the kind of visibility into what's going on in our network that we can never have without them...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »