Tue, April 30, 2013 - Splunk is seeking to make it easier than ever to use statistical analysis on your machine-generated data to automate the identification of anomalies and outliers in your systems.
Tue, April 23, 2013 - The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores the need to adopt out-of-band two-factor authentication and keystroke encryption.
Thu, March 28, 2013 - IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
Thu, March 07, 2013 - Small and medium-sized businesses are beginning to find that virtualized network security isn't as different as physical network security as they thought. This makes cloud adoption simpler, but it also presents unique challenges.
Fri, February 15, 2013 - Responding to the increasing number of threats aimed at certificate authorities and the ecosystem of trusted online transactions they represent, seven certificate authorities have come together to form an advocacy group to advance security standards and promote best practices.
Thu, January 31, 2013 - How does the latest Wi-Fi hardware from Ruckus Wireless stack up? This review rates two access points and one controller appliance on configuration, security, authentication and performance--all key considerations for a small business that wants a new or upgraded Wi-Fi network.
Tue, January 29, 2013 - NSS Labs today released test results of performance, management and security capabilities in a dozen low-end network firewalls, with Check Point, Juniper and Stonesoft earning top technical scores.
Tue, January 29, 2013 - Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments.