News

Security Manager's Journal: Two new features in the Snort intrusion-detection software dramatically cut down on false-positive alerts while cutting down on log data flows that need analysis.
Building a functional IDS sensor is only the first step. Once installed, the IDS administrator should spend a significant amount of time exploring the alerts and capabilities of the system.
Properly placing IDS sensors requires a thorough understanding as to which data and assets you're trying to defend, as well as the types of threats of primary concern.
A report from China Times (via GforGames) claims Taiwan Semiconductor Manufacturing Company is expanding its 8-inch chip plant in order to produce Touch ID sensors for the iPad Air 2 and iPad mini ...
You can think of the Touch ID sensor as a key and the A7 processor as a door lock. If every key worked in every lock, it would be easy to simply copy any key and let yourself into someone else’s ...
IDS has integrated the high-resolution 12 MP IMX226 rolling shutter sensor into the uEye CP camera family, giving increased resolution, speed and sensitivity. The new models are available with the ...