Jeff Pollard, principal analyst at Forrester Research, advises that when building a budget for an intrusion detection and protection system, organizations should consider factors such as their business initiatives, architecture and deployment, and budgetary impact. When comparing vendors, organizations should look for features such as pattern matching, heuristics and behavior-based analysis, SSL inspection, network visibility, application service control, network access policy, integration with other solutions, forensics capabilities, data leakage protection, and embedded bypass. Several leading security specialists offer tools that provide these features.

Alleged Iranian hackers target victims in Saudi Arabia with new spying malware
Iran-based hacking group APT34 has launched a new cyber espionage operation, according to cybersecurity firm Trend Micro. The group has been infecting victims with the