News

News

  • February 24, 2015 24 Feb'15

    Business disruption cyber attacks set to spur defence plans, says Gartner

    By 2018, 40% of organisations will have plans to address cyber-security business disruption attacks, up from 0% in 2015, says Gartner

  • February 23, 2015 23 Feb'15

    Slow adoption of DMARC policy leaves email vulnerable, vendor says

    A new study finds that enterprises, especially healthcare companies, are slow to adopt the DMARC email authentication standard, making them vulnerable to malicious emailers.

  • February 23, 2015 23 Feb'15

    Cisco touts OpenAppID for internal application traffic visibility

    Use of Cisco's OpenAppID application-layer traffic-detection tool is still modest compared to Snort, but the networking giant says it can help enterprises improve traffic visibility on internal applications.

  • February 23, 2015 23 Feb'15

    Lenovo faces lawsuit for pre-installing Superfish adware

    A class action lawsuit has been filed against Lenovo after it was found to have pre-installed adware vulnerable to cyber attacks

  • February 20, 2015 20 Feb'15

    Maintaining vendor trust proves tough for Lenovo, Microsoft

    News roundup: Amid hidden add-ons, discontinued services and walled gardens, vendor trust proves elusive for several high-profile tech firms. Plus: Evidence ties North Korea to Sony Pictures hack; card brands boost cybersecurity; and cookies that ...

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • February 20, 2015 20 Feb'15

    Flaws in alternative Android browsers pose underestimated risk

    Exclusive: VerSprite research on 10 alternative Android browsers has found at least one major security vulnerability in all of them, posing a significant security risk for enterprise Android users.

  • February 20, 2015 20 Feb'15

    Gemalto denies knowledge of GCHQ and NSA Sim card hack

    Gemalto says it cannot verify a report that it was hacked by the NSA and GCHQ to steal encryption keys

  • February 18, 2015 18 Feb'15

    Password reuse and password sharing prevalent in enterprises

    The high percentage of password reuse and sharing by employees leaves enterprises vulnerable to breaches, according to a recent survey from SailPoint Technologies.

  • February 17, 2015 17 Feb'15

    UTM vs. NGFW: Unique products or advertising semantics?

    In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics.

  • February 17, 2015 17 Feb'15

    International spyware operation linked to NSA

    The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers

  • February 13, 2015 13 Feb'15

    Security information sharing: A double-edged sword

    News roundup: While data sharing can boost intelligence and improve security, recent events show the benefits don't always outweigh the pitfalls. Plus: Chip-enabled POS systems coming quickly; MongoDB databases exposed; sophisticated phishing scams.

  • February 12, 2015 12 Feb'15

    Report: Firewall policy management is a hot mess

    A new report from FireMon finds that firewalls are still a critical security component, but firewall policy management is a major pain point for admins.

  • February 10, 2015 10 Feb'15

    February 2015 Patch Tuesday: Group Policy flaw tops three critical fixes

    Microsoft's February 2015 Patch Tuesday release offers three critical fixes, including one for a dangerous Group Policy vulnerability, but does not patch a recently revealed IE XSS zero-day flaw.

  • February 10, 2015 10 Feb'15

    Will Chip and PIN technology boost payment card transaction security?

    Visa and MasterCard are putting pressure on merchants to implement Chip and PIN technology, and while it will improve transaction security, it won't make PCI compliance any easier.

  • February 10, 2015 10 Feb'15

    Voltage Security acquisition to bolster HP's data protection offerings

    HP has agreed to acquire encryption vendor Voltage Security. Gartner says the move will bolster HP's data protection and cloud security products.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close