Enterprise Network Security

  • February 16, 2017 16 Feb'17

    Connected medical devices spark debate at RSA Conference session

    An RSA Conference session on a new attack on connected medical devices led to a spirited debate on vulnerability disclosure and manufacturer responsibility.

  • February 14, 2017 14 Feb'17

    RSA President Rohit Ghai details new cybersecurity platform at RSAC 2017

    Michael Dell introduces RSA's newly appointed president, Rohit Ghai, who is set to lead the cybersecurity firm as it implements its new Business Driven Security platform.

  • April 28, 2015 28 Apr'15

    Comparing the top SSL VPN products

    Expert Karen Scarfone examines the top SSL VPN products available today to help enterprises determine which option is the best fit for them.

  • April 03, 2015 03 Apr'15

    The transaction that lasts forever

    Whether or not you think Bitcoin has a future, it has a couple of very interesting technological elements that will probably have a life of their own. The aspect that everyone talks about is that ...

  • March 23, 2015 23 Mar'15

    Cisco IP phones vulnerable to eavesdropping; no patch available yet

    Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.

  • March 11, 2015 11 Mar'15

    HP enterprise security: Can acquisitions lead to cohesive strategy?

    Through acquisitions Hewlett-Packard has built a formidable lineup of enterprise security offerings, but experts question whether a strong brand can overcome legacy technology and a lacking endpoint strategy.

  • March 04, 2015 04 Mar'15

    Why Hillary can't mail

    Reporting by The New York Times notwithstanding, it appears to this non-lawyer that Hillary Clinton probably didn't break any laws by using a personal email account to conduct state business. But ...

  • February 18, 2015 18 Feb'15

    When is an ISAC not an ISAC?

    A lot of what went on at the White House Summit on Cybersecurity and Consumer Protection, held at  Stanford University last week was for show — a reaction in particular to the attacks allegedly ...

  • February 17, 2015 17 Feb'15

    UTM vs. NGFW: Unique products or advertising semantics?

    In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics.

  • February 13, 2015 13 Feb'15

    Prevoty offers context-aware, automatic RASP

    Though I’ll admit to a bit of skepticism about Runtime Application Self Protection (RASP), I was nevertheless impressed with a recent look at Prevoty. The two-year-old company’s product, which ...

  • February 12, 2015 12 Feb'15

    Report: Firewall policy management is a hot mess

    A new report from FireMon finds that firewalls are still a critical security component, but firewall policy management is a major pain point for admins.

  • November 01, 2014 01 Nov'14

    We honor the winners of Information Security Readers' Choice 2014

    More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.

  • October 29, 2014 29 Oct'14

    McAfee security products to gain integrated threat intelligence feeds

    Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

  • August 08, 2014 08 Aug'14

    Yahoo CISO: Enterprise security companies letting us down

    At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.

  • February 21, 2014 21 Feb'14

    Black Hat researcher turns out the lights

    With Black Hat's conference in Singapore coming up next month, I found myself chatting with independent security researcher Nitesh Dhanjani, who'll be giving a presentation at the March 25-28 ...