IDS mailing list archives

ICSA Lab Network IPS RSS Feed


From: "Walsh, John (Jack)" <jwalsh () icsalabs com>
Date: Wed, 20 Feb 2008 08:43:50 -0500

Focus-IDS Readers:

ICSA Labs has set up an RSS feed that will allow you to keep up-to-date
with the latest happenings and developments within the ICSA Labs Network
IPS certification testing program and Network IPS Product Developers
consortium (NIPD).

This particular network IPS feed has been piloted for several months
now.  Included on the feed to date have been news concerning: 

 * announcements about products attaining certification,
 * announcements about products being decertified,
 * newly released certification testing reports,
 * newly released maintenance testing reports
  (note that cert'd products are tested both annually and after we rev
the vuln set),
 * announcements about changes to the composition of NIPD members,
 * where to find whitepapers we've written,
 * how to see/hear webcasts and conference events we've been involved
in,
 * changes to the criteria and vulnerability sets against which devices
are tested, and
 * requests for public comments on the vulnerability sets.
  
The feed will continue to be used for all that and more.  You can
subscribe to the feed from any of 4 ICSA Labs network IPS web pages
including the network IPS certified products list at:

 http://www.icsalabs.com/nips/certifiedproducts.html

From there you'll see the blue RSS image icon that you can often just
drag and drop into your feed reader (or just click on the icon if you
have no reader but want to read the feed).  If you have comments or
suggestions please feel free to send them to me directly.

Take care,
Jack Walsh
Technology Programs Manager,
Intrusion Detection & Prevention
ICSA Labs, An Independent Division of Verizon Business
1000 Bent Creek Blvd., Suite 200
Mechanicsburg PA 17050
717.790.8126
jwalsh () icsalabs com

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------


Current thread: