News

News

  • February 17, 2015 17 Feb'15

    UTM vs. NGFW: Unique products or advertising semantics?

    In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics.

  • February 17, 2015 17 Feb'15

    International spyware operation linked to NSA

    The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers

  • February 13, 2015 13 Feb'15

    Security information sharing: A double-edged sword

    News roundup: While data sharing can boost intelligence and improve security, recent events show the benefits don't always outweigh the pitfalls. Plus: Chip-enabled POS systems coming quickly; MongoDB databases exposed; sophisticated phishing scams.

  • February 12, 2015 12 Feb'15

    Report: Firewall policy management is a hot mess

    A new report from FireMon finds that firewalls are still a critical security component, but firewall policy management is a major pain point for admins.

  • February 10, 2015 10 Feb'15

    February 2015 Patch Tuesday: Group Policy flaw tops three critical fixes

    Microsoft's February 2015 Patch Tuesday release offers three critical fixes, including one for a dangerous Group Policy vulnerability, but does not patch a recently revealed IE XSS zero-day flaw.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • February 10, 2015 10 Feb'15

    Will Chip and PIN technology boost payment card transaction security?

    Visa and MasterCard are putting pressure on merchants to implement Chip and PIN technology, and while it will improve transaction security, it won't make PCI compliance any easier.

  • February 10, 2015 10 Feb'15

    Voltage Security acquisition to bolster HP's data protection offerings

    HP has agreed to acquire encryption vendor Voltage Security. Gartner says the move will bolster HP's data protection and cloud security products.

  • February 09, 2015 09 Feb'15

    Security professionals warn against relying on cyber insurance

    Security professionals have warned businesses not to rely on cyber insurance in the face of increased cyber attacks.

  • February 06, 2015 06 Feb'15

    Same-origin policy IE vulnerability may signal new attack trend

    A new IE vulnerability has led to a proof-of-concept same-origin policy exploit, and some experts say it highlights a technique that may soon become popular among attackers.

  • February 06, 2015 06 Feb'15

    Budget, breach law highlight growing federal cybersecurity awareness

    News roundup: With the proposed 2016 federal budget and push for a national data breach law, Washington may finally care about cybersecurity. Plus: Coviello to retire; Flash patched again; Sony Pictures breached by Russians and loses its co-chair.

  • February 06, 2015 06 Feb'15

    Report: Most enterprise security operations centers ineffective

    A new report by HP shows most enterprise security operations centers fail to meet recommended maturity levels needed to detect and manage cybersecurity threats.

  • February 05, 2015 05 Feb'15

    Digitally signed malware risk on the rise, Kaspersky finds

    Kaspersky reports digitally signed malware -- malicious files using legitimate digital certificates -- is a growing threat to enterprises, increasing four-fold in the past six years.

  • February 05, 2015 05 Feb'15

    US health insurer Anthem hacked, exposing up to 80 million records

    Hackers have broken into a database at US health insurer Anthem said to contain the personal data of up to 80 million people

  • February 04, 2015 04 Feb'15

    Sony says cyber attack will cost $15m

    Sony expects the investigation and remediation costs of the November 2014 cyber attack on its movie subsidiary will amount to $15m

  • February 02, 2015 02 Feb'15

    Adobe Flash patch promised this week for new zero-day bug

    Trend Micro discovered a new zero-day bug in Adobe Flash that is being actively exploited in the wild. Adobe promises a patch for the vulnerability this week.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close