Tue, March 25, 2014 - Jerry Irvine, Prescient Solutions CIO and a member of the National Cybersecurity Partnership, spoke with CIO.com about "Internet of Things" (IoT) security, the connected home, and why consumers and enterprise should be wary of both.
Thu, February 13, 2014 - There's no denying the potential for mobile devices to improve efficiencies and lower costs for workers in industries of all types. You also can't deny the potential security vulnerabilities that mobile devices present. These seven tips will help you secure your mobile environment without placing a burden on your workforce.
Tue, November 26, 2013 - A new study by Ponemon Institute finds many small and mid-sized business don't see cyber attacks as a significant threat to their business.
Thu, October 17, 2013 - Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed.
Tue, October 15, 2013 - ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
Mon, August 26, 2013 - Executives at midsized industrial firms believe their data is at little or no risk, even though they hold valuable intellectual property and business process data sought by criminals, according to consulting firm McGladrey.
Fri, July 26, 2013 - These days, and with the help of Cisco and EMC, Intel is dipping its toes into the networking and storage ends of the enterprise technology pool. Add this to Intel's server expertise and the data center of the future may be at hand.
Wed, May 01, 2013 - A10 Networks this morning announced a new line of application delivery controllers -- distinct from the existing AX series -- dubbed "Thunder," saying that the new units offer more capacity in a smaller footprint.
Tue, April 30, 2013 - Splunk is seeking to make it easier than ever to use statistical analysis on your machine-generated data to automate the identification of anomalies and outliers in your systems.
Tue, April 23, 2013 - The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores the need to adopt out-of-band two-factor authentication and keystroke encryption.
Thu, March 28, 2013 - IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
Thu, March 07, 2013 - Small and medium-sized businesses are beginning to find that virtualized network security isn't as different as physical network security as they thought. This makes cloud adoption simpler, but it also presents unique challenges.
Fri, February 15, 2013 - Responding to the increasing number of threats aimed at certificate authorities and the ecosystem of trusted online transactions they represent, seven certificate authorities have come together to form an advocacy group to advance security standards and promote best practices.
Thu, January 31, 2013 - How does the latest Wi-Fi hardware from Ruckus Wireless stack up? This review rates two access points and one controller appliance on configuration, security, authentication and performance--all key considerations for a small business that wants a new or upgraded Wi-Fi network.