Enterprise Network Security
- October 22, 2019
Forcepoint has delivered a web-based security tool leveraging elastic cloud gateway technology that allows admins to access content from any remote location.
- October 11, 2019
Cybersecurity attacks continue to rise, taking advantage of network vulnerabilities -- and human ones. First National Technology Solutions' CISO offers advice.
- September 10, 2019
Application Metadata Intelligence identifies network performance, application performance, operational technology communications and security and threat detection.
- September 06, 2019
Trustwave Fusion is a cloud-based cybersecurity platform designed with the goal of giving users better insight into how security resources are provided and monitored.
- September 05, 2019
One hundred hackers and 75 hackers in training gathered in Las Vegas for HackerOne's hacking event to find security flaws in organizations, including Verizon Media and GitHub.
- August 12, 2019
The 22nd Black Hat conference in Las Vegas brought together a slew of vendors in network and data security with a variety of security offerings to pitch.
- August 05, 2019
New features include containerized firewalls and the incorporation of SecIntel into MX Series routers as part of Juniper Networks' effort to provide security throughout a network.
- July 31, 2019
Qualys IOC 2.0 comes with increased threat detection and response capabilities designed to more accurately detect indicators of compromise and potential cyberattacks.
- June 18, 2019
ReliaQuest's security analytics platform, GreyMatter, claims to improve threat detection by up to four times and reduce system downtime by 98% by integrating AI and human analysis.
- May 01, 2019
Why worry over Huawei? A U.S. ban of this Chinese company's products should remind CISOs that now is the time to consider security issues related to the rollout of the 5G network.
- March 06, 2019
Cisco told RSA attendees the need for network security on the factory floor is growing. Cisco says cooperation between IT and operations is key to protecting equipment.
- February 21, 2019
CrowdStrike's annual global threat report highlights why speed is critical for cybersecurity defenders. Experts sound off on key findings, including the rise of 'big game hunting.'
- February 19, 2019
Palo Alto Networks announced its plan of acquiring SOAR vendor Demisto for $560 million to accelerate its Application Framework strategy and beef up security operations automation.
- February 15, 2019
Cybereason's Nocturnus Research team has discovered a new strain of the Astaroth Trojan that attacks antivirus software to steal credentials.
- February 08, 2019
Check Point Research explains why SpeakUp, the new Trojan targeting Linux servers, has the potential to unleash more harm and offers pointers on how to defend against such malware.
- February 16, 2017
An RSA Conference session on a new attack on connected medical devices led to a spirited debate on vulnerability disclosure and manufacturer responsibility.
- February 14, 2017
Michael Dell introduces RSA's newly appointed president, Rohit Ghai, who is set to lead the cybersecurity firm as it implements its new Business Driven Security platform.
- April 28, 2015
Expert Karen Scarfone examines the top SSL VPN products available today to help enterprises determine which option is the best fit for them.
- April 03, 2015
Whether or not you think Bitcoin has a future, it has a couple of very interesting technological elements that will probably have a life of their own. The aspect that everyone talks about is that ...
- March 23, 2015
Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.
- March 11, 2015
Through acquisitions Hewlett-Packard has built a formidable lineup of enterprise security offerings, but experts question whether a strong brand can overcome legacy technology and a lacking endpoint strategy.
- March 04, 2015
Reporting by The New York Times notwithstanding, it appears to this non-lawyer that Hillary Clinton probably didn't break any laws by using a personal email account to conduct state business. But ...
- February 18, 2015
A lot of what went on at the White House Summit on Cybersecurity and Consumer Protection, held at Stanford University last week was for show — a reaction in particular to the attacks allegedly ...
- February 17, 2015
In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics.
- February 13, 2015
Though I’ll admit to a bit of skepticism about Runtime Application Self Protection (RASP), I was nevertheless impressed with a recent look at Prevoty. The two-year-old company’s product, which ...
- February 12, 2015
A new report from FireMon finds that firewalls are still a critical security component, but firewall policy management is a major pain point for admins.
- November 01, 2014
More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.
- October 29, 2014
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
- August 08, 2014
At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.
- February 21, 2014
With Black Hat's conference in Singapore coming up next month, I found myself chatting with independent security researcher Nitesh Dhanjani, who'll be giving a presentation at the March 25-28 ...
- September 27, 2013
Ran across the Fortune 1000 Cyber Disclosure Report, published earlier this month by Willis North America, a unit of Willis Group Holdings. The report found that among the Fortune 501-1,000, 22% ...
- August 29, 2012
Last week, when Symantec researchers said they had discovered the Windows version of the Crisis Trojan could spread to VMware virtual machines, it was big news. But Trend Micro doesn't see Crisis ...
- July 26, 2012
It seems the Federal Financial Institutions Examination Council could have done a little better with its cloud computing advisory. Earlier this month, the FFIEC issued a statement on outsourced ...
- July 18, 2012
A recent audit into U.S. federal agencies' adoption of cloud computing services highlighted challenges that likely would resonate with private enterprises looking to move applications to the cloud. ...
- July 11, 2012
AWS outage won't deter Netflix from the cloud. Netflix says it remains bullish on the cloud despite AWS outage.
- June 28, 2012
Mobile device security threats are taking center stage as IT managers strive to protect and control these nimble creatures that contain company information and access the company network. But ...
- June 21, 2012
As the opening day of the 2012 Olympic Games nears, IT teams in the U.K. are busy expanding their companies’ security policies and reviewing their security contingency plans. They are preparing for ...
- June 14, 2012
Security awareness training often teaches the importance of password length and password complexity, but these best practices, as it turns out, may be creating a false sense of security. Even ...
- June 08, 2012
Wednesday's Cornerstones of Trust Conference featured an interesting CSO discussion of some of the hottest topics infosecurity pros are dealing with today, including the BYOD trend, cloud computing ...
- June 01, 2012
Security experts have warned about the potential problems caused by military cyberstrikes. Experts say cyberwarfare is difficult to plan and worse, it puts innocent people at risk. Stuxnet was part ...
- May 31, 2012
After working hard to create sound security policies, it's easy for enterprise information security managers to be dismayed when users ignore the rules and knowingly bypass security controls. When ...
- May 30, 2012
A bane for U.S.-based cloud providers for several months now has been the assumption among cloud customers and service providers outside the U.S. - especially in Europe - that the Patriot Act gives ...
- May 16, 2012
Information security spending is thought to be recession proof, but does it have the legs to outrun the current downturn? In-Q-Tel partner Peter Kuper thinks so, but there are still some rough ...
- May 16, 2012
At an event last week in San Francisco that covered a variety of cloud security issues, infosec expert Kevin Walker told attendees to be aggressive with cloud service providers and hold them ...
- May 09, 2012
Symantec recently released some interesting findings from a survey the company conducted with the Cloud Security Alliance at the CSA Summit in February. The survey went beyond the usual sorts of ...
- May 09, 2012
When Microsoft issued version 12 of its Security Intelligence Report (.pdf) last month, its marketing machine had one message it wanted journalists to communicate to businesses: Conficker worm ...
- May 02, 2012
As security pros wait for more details about the VMware ESX hypervisor source code leak, should they be panicking? Well no, not yet, anyway. Without knowing exactly what source code was leaked, ...
- May 01, 2012
Oracle has a problem. And it’s summed up pretty well by the current uproar over the lack of a patch for a zero-day vulnerability in the Oracle TNS Listener. It’s the same problem Microsoft had a ...
- April 24, 2012
Two program managers from the Microsoft Security Response Center shared a tale last week at SOURCE Boston of how a serious vulnerability reported to the MSRC fell into a spam filter and caused an ...
- April 11, 2012
Cloud transparency remains a highly coveted but seemingly elusive wish for organizations. How can you trust a cloud provider with your data if you don't know what security controls they implement? ...
- April 09, 2012
Aligning IT security with business goals is nice, but is it always realistic? Mandates from management often clash with the industry’s ideal characterization of an IT security leader.
- April 05, 2012
BOSTON -- Privacy is a fog rolling in over the land. That’s how Jeff Northrup, IT director of the International Association of Privacy, described personal information privacy during his ...
- April 03, 2012
Another day, another security information and event management vendor acquired. Well, O.K, the deals aren't that frequent, but standalone SIEM vendors have become popular acquisition targets. On ...
- April 03, 2012
The Global Payments credit card security breach shines a harsh light on PCI non-compliance. Experts wonder if the breach goes deeper than the 1.5 million cards reported stolen, or whether there is ...
- March 28, 2012
Verizon DBIR sheds some light on cloud computing breaches. Verizon says cloud computing breaches have more to do with organizations giving up control of assets rather than cloud technology ...
- March 26, 2012
The country’s major ISPs signed on to the U.S. Anti-Bot Code of Conduct for Internet Service Providers, which does little for botnet prevention and removal by stopping short of demanding ISPs ...
- March 23, 2012
Cloud outages are always big news - and for good reason, because they usually affect many people. Last month's Microsoft Azure outage was no exception. But at least Microsoft appears to be trying ...
- March 19, 2012
The programming language behind the Duqu Trojan’s command-and-control communications module was written in a custom version of C and compiled with Microsoft Visual Studio 2008—an indication of a ...
- March 15, 2012
Security research firm Securosis has started a series of blog posts about how to protect enterprise data on Apple iOS smartphones. Securosis' Rich Mogull explains that companies are increasingly ...
- March 13, 2012
A look at how information security roles may be impacted by increased adoption of cloud services.
- March 12, 2012
Vulnerability research is at a crossroads as bug hunters in pursuit of zero-day vulnerabilities and exploits feel pressure from the security community.
- March 07, 2012
CloudFlare kept LulzSec’s website up for 22 days last summer despite a barrage of attacks.
- March 06, 2012
Traditional antivirus vendors are doing a good job detecting and blocking known mobile malware, according to Av-Test, a Germany-based independent service provider that tests antivirus and ...
- February 29, 2012
With the evolution of malware and threats, are security industry technologies like signature-based antivirus, and intrusion protection and detection working? Or, are we losing the battle?
- February 28, 2012
Former NSA director Mike McConnell discussed the economic cyberespionage threat, and why we need to do more to protect against it at the Cloud Security Alliance (CSA) Summit at RSA Conference 2012.
- February 03, 2012
CANCUN, Mexico -- Kaspersky Labs cofounder and chief executive Eugene Kaspersky announced today that the Russian security company will not pursue an initial public offering in the forseeable future ...
- December 06, 2011
Security assessment reviews an organization’s mobile security policies and technologies, evaluating the mobile security posture against a set of 15 core elements. Symantec’s consulting team is ...
- November 17, 2011
Vulnerability management company Rapid7, commercial home of the Metasploit Project, announced today it has secured $50 million in venture funding from Technology Crossover Ventures of Palo Alto, ...
- November 02, 2011
Another day, another vulnerability reporting reward program. Kinda. Secunia, a vulnerability management vendor from Denmark, is the latest to join the bounty brigade, but it is bringing its spin to ...
- October 18, 2011
Move is part of an industry trend that turns threat intelligence data into actionable information. Symantec is bolstering its DeepSight service and integrating its VeriSign acquisition. The company ...
- September 13, 2011
SMS-stealing Trojan poses as banking protection but once installed it can intercept text messages, sending them to the attacker’s command and control server. A new banking Trojan from ...
- September 12, 2011
Since going public in 2007, network security company Sourcefire Inc., the home of the open source Snort intrusion detection and prevention system, has been busy expanding the breadth of its ...
- August 17, 2011
List of malware domains can be fed into IPS and IDS appliances to disrupt communication between malware and an attacker’s command and control server. RSA is bolstering its CyberCrime Intelligence ...
- August 11, 2011
At last week’s Black Hat 2011 conference, the Central Intelligence Agency’s former director of operations, Cofer Black, made the claim that the security community has a unique opportunity to ...
- August 10, 2011
The update to the Microsoft Malicious Software Removal Tool (MSRT) includes the removal of FakeSysdef, a pesky Trojan that poses as a system performance tool. Microsoft has bolstered its Malicious ...
- July 19, 2011
Until this week, Malwarebytes went about its business of tracking and removing malware pretty quietly. But on Monday, the company went public so to speak, announcing that it recently reached 100 ...
- July 06, 2011
FoxNews.com and PayPal UK Twitter accounts get hijacked by anonymous groups. Hackers took control of two prominent Twitter accounts recently, posting false messages to followers of the accounts of ...
- June 23, 2011
Move to acquire Infrared Security will add static code analysis to WhiteHat’s dynamic vulnerability testing platform. WhiteHat Security has acquired static code analysis technology from Infrared ...
- June 21, 2011
Breach is part of a string of high profile attacks targeting gaming networks and other websites. Experts say enterprises should assess their basic security defenses. Sega Corp. has warned its ...
- May 31, 2011
Sony has spent $171 million cleaning up its massive data breach. One security firm outlines mistakes. Spring 2011 has not been good for executives at Sony. Security vendor Lumension Security put ...
- May 27, 2011
Google’s NFC service will be thoroughly vetted for vulnerabilities, access for cybercriminals. Cloning may be possible. Google’s new near field communication (NFC) payment service, Google Wallet, ...
- May 20, 2011
Acquisition of Clearwell Systems Inc. bolsters Symantec's eDiscovery capabilities in a crowded market for software that helps contain civil litigation costs. Symantec Corp. has agreed to acquire ...
- May 16, 2011
An attacker rented space on Amazon’s EC2 service to wage cyber attacks on Sony Corp., according to a report. Sony restarted its PlayStation Network and Qriocity services over the weekend and ...
- May 10, 2011
The French security firm exploited a Google Chrome vulnerability, bypassing its sandboxing security feature and ASLR and DEP capabilties. Google Chrome’s sandboxing security technology, designed to ...
- April 29, 2011
Hackers posting on underground forums claim the data stolen from the PlayStation Network includes user names, addresses, dates of birth, credit card numbers, expiration dates and card verification ...
- February 17, 2011
SAN FRANCISCO -- While it may not be a security pro's worst nightmare, it certainly wouldn't be considered a pleasant dream. In 2009, David Compton, system administrator for Aspire of Western New ...
- February 16, 2011
SAN FRANCISCO -- When HP announced last September its intent to acquire SIM leaders ArcSight, it was a pretty startling $1.5B deal. Not only had another security company fallen off the map into the ...
- February 15, 2011
SAN FRANCISCO -- It's pretty tough to get a cynical, often paranoid, group of people to rise in unison in approval. It's pretty tough, however, not to extend a standing ovation to cryptography and ...
- February 14, 2011
Lumension announced the Endpoint Intelligence Center to protect endpoint computers from threats, malware and third-party software vulnerabilities.
- January 31, 2011
The Center for Internet Security's US Cyber Challenge today kicked off an online competition to identify high school students possibly interested in cybersecurity career. The Cyber Foundations ...
- January 13, 2011
Rebranding part of strategy to streamline operations and expand technology portfolio. Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets ...
- January 05, 2011
Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to ...
- November 29, 2010
Trend Micro on Monday said it signed a deal to buy Mobile Armor, a provider of endpoint encryption technology. The St. Louis, Mo.-based company sells full-disk, file/folder, and removable media ...
- October 27, 2010
An all out assault on privacy is taking place and some people are failing to see the problem. Toronto – Many of the people who claim the death of privacy are profiting from it, according to a ...
- October 21, 2010
IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. IBM announced this week new professional and technology ...
- October 14, 2010
ISEC Partners, a pen-testing and security services consultancy that has been at the forefront of innovative research in the past half-decade, was acquired today by NCC Group of Manchester, England. ...
- October 06, 2010
The acquisition expands Qualys’ IDS signatures and increases its threat data. Vulnerability management vendor Qualys Inc. announced the acquisition of Madison, Wisconsin-based Nemean Networks LLC ...
- July 27, 2010
Commtouch, a Sunnyvale, Calif.-based OEM supplier of messaging and Web security, said Tuesday that it inked a deal to acquire the Command antivirus division of Authentium. Commtouch expects to pay ...
- July 15, 2010
A search for “Mel Gibson tapes” yields plenty of poisoned webpages, according to TrendLabs researchers. People searching for information related to the Mel Gibson controversy will get a startling ...
- February 09, 2010
Proof-of-concept code released by a security researcher could be tweaked for use on almost any device. Demonstrates need for caution with mobile applications. A security researcher demonstrating ...