Stories by Deborah Radcliff

The evolution of IDS

Drowning in signature libraries and reactive event information that is of little value in locating attacks in progress, network security managers are fed up with signature-based intrusion-detection systems that have been the backbone of network security. Amid an ever-shrinking time gap between vulnerabilities and exploits, signature-matching IDS already has become obsolete, analysts and users say.

Deborah Radcliff | 09 Nov | Read more

Case Study: The external attack

For the most part, hackers break into corporations for one reason: Status. "The hacking community is a strong meritocracy where status is determined by level of competence," says Dr. Max Kilger, a social psychologist for the Honeynet Project.

Deborah Radcliff | 02 Mar | Read more

Editor's Recommendations

Brand Page


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release