• June 22, 2006 22 Jun'06

    VoIP protocol insecurity

    Like many Internet protocols, SIP was designed with simplicity, not security, in mind. And, although H.323 was created to meet broader goals, security issues have plagued it as well. Expert Lisa Phifer examines some of the vulnerabilities in this ...

  • June 15, 2006 15 Jun'06

    Managed DSL VPN cuts costs for risk management firm

    GAB Robins has hundreds of sites and bandwidth-intensive users and applications. When Frame Relay just wouldn't cut it anymore, the company's network architects went with a managed broadband VPN from virtual network operator Virtela.

  • April 06, 2006 06 Apr'06

    Service provider selects managed network monitoring

    A Bermuda telecommunication and IT service provider boosts visibility into the network with InteQ managed services, which can be used in concert with HP OpenView.

  • March 21, 2006 21 Mar'06

    Disaster recovery, security drive financial firm to Private IP

    A financial firm picked Verizon Private IP to connect branch offices, build a disaster recovery site, and secure customer info.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • How to Use a Threat Intelligence Service

      The is a new breed of threat intelligence services but how can enterprise security teams use these capabilities to detect and mitigate targeted threats? See More

    • The New Breed of Threat Intelligence Services

      The focus of most cybersecurity organizations has shifted from mass attacks to unique threats that target specific industries, specific software applications or even specific enterprises. In the vast majority of cases, it takes too long to detect, analyze and mitigate these attacks. See More

    View All Sponsored News