contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers

VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP.


Access Management and User Accountability for WLANs
Author: Vernier Networks, Inc.
Wednesday, 12 January 2005, 21:12 GMT

“We have met the enemy, and he is us.” Read the latest FBI/CSI Computer Crime and Security Survey, and that adage from the old Pogo comic strip is likely to be your conclusion. The survey found that insider abuse of network access was the second most common form of network attack. Insider abuse was reported by 80% of survey respondents—second only to virus incidents (82%). And—just as astonishing—disgruntled employees (77%) were ranked just behind independent hackers (82%) as a likely source of attacks.1 As these numbers show, organizations who want to secure their networks need to do more than erect a defensive perimeter to keep out strangers. They need to find a way to prevent attacks from insiders, as well.
Read the full paper in PDF here

Tuesday, September 20, 2005

Network Security

· On Security, Is Oracle the Next Microsoft?
· Secure wireless email on Mac OS X
· Internet Explorer 7 Security in Brief
· Why is Application Security so Elusive?


GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!


Wireless Security

· Secure unmanaged Wi-Fi clients
· Gartner: Secure endpoints key for mobile computing
· The Mobility Threat
· Top 10 Mobile Device Privacy Policies




Press Releases

· New fraud detection and prevention software can help companies to achieve an average increase in profit of between 10% and 40% per annum
· Managed Security Services Pioneer Cybertrust Announces Availability of OnlineGuardian 3.5
· CryptoEngine Integration of HW Acceleration With NicheStack(TM) IPv4, SSL and IPSec Dramatically Improves Communications Performance on Freescale Microcontrollers
· Juniper Networks Continues to Lead in High-End Firewall/VPN and SSL VPN Markets
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter