Firewalls and intrusion detection systems (IDS) complement each other by blocking unauthorized traffic and spotting suspicious patterns. Firewalls enforce specific access rules, while IDS monitors ...
Jeff Costlow, CISO at ExtraHop, makes the case for implementing next-gen intrusion-detection systems (NG-IDS) and retiring those noisy 90s compliance platforms. After more than 20 years of ...
Intrusion detection technology presents a confusing array of acronyms, abstract concepts, and hazy deliverables. This exacerbates the difficult situation for executives who are asked to pay for these ...
Security practitioners diving into cloud computing must make older security tools like IDS work in this new world. In a CSO podcast last week, Stu Wilson, CTO of IDS provider Endace, sought to explain ...
I wrote this in 2004 for the San Francisco Chronicle, but it's still important. In recent years there has been an increased use of identification checks as a security measure. Airlines always demand ...
This article is the second in a short series examining vulnerability assessment systems and intrusion detection systems. The first article looked at fundamental concepts and terminology; this one has ...