IT Strategy
News
Britain E-Passports Cracked in Two Days' Time
The New Zealand Department of Internal Affairs (DIA) is not concerned about reports from the United Kingdom that say radio frequency …News
PKI Will Grow, But Policy Problems Remain
Public key infrastructure is poised for a resurgence, with associated identity technologies increasingly underpinning applications as organizations look to securely …News
Mozilla Firefox Flaw Puts Users' Password Info at Risk
A bug discovered within Mozilla’s Firefox Web browser enables online scammers to more easily steal log-in and password information from …News
E.U. Fights Flood of Spam, Spyware
The European Commission has warned its member states to beef up their efforts to cut spam, spyware and malicious software, …News
Microsoft Files Suits Against Phishers
Microsoft has initiated 97 lawsuits throughout Europe and the Middle East during its eight-month investigation into fraudulent webpages, with another …News
Study: Antiphishing Toolbars No Good
A new study of antiphishing toolbars has come to a stark conclusion about their effectiveness: None of them is any good.A …News
Second Life Hit With 'Grey Goo' Virtual Virus
Second Life, an online virtual world, was hit over the weekend with a virtual virus—dubbed “grey goo”—that inserted self-replicating objects …News
Malaysian Gov't Portal Used by PayPal Phishers
An antispam researcher has uncovered a phishing scam that uses computers belonging to both a medical transcription outsourcing company and …News
IronPort: Image-Based Spam Now in the Billions
Global spam has increased nearly 100 percent year on year according to current statistics from the IronPort Threat Operation Center—a …News
Security Vendor Settles Charges After Getting Hacked
Guidance Software, a vendor of computer forensics and security products, has settled a complaint filed by the U.S. Federal Trade …News
Attack Code Posted for Latest Microsoft Bugs
Hackers have posted code that could be used to target Microsoft’s Windows operating system in a worm attack.The code, which …News
MessageLabs, Telstra Team to Secure Broadband
MessageLabs has continued its push into the small-to-midsize-business (SMB) sector by partnering with Telstra in Australia to provide a spam …News
Microsoft IDs Google Gmail as Virus
Microsoft’s fledgling consumer antivirus service, Windows Live OneCare, wrongly identified Google’s Gmail service as a virus infection last week, Microsoft …News
Nokia Releases Sourcefire-Based Security Appliance
Nokia has introduced a security appliance aimed at helping enterprises keep their networks secure, particularly in the face of threats …News
Mozilla-Funded Study: Firefox 2 Tops IE 7 in Antifraud
A Mozilla-commissioned study has given the antifraud features in the Firefox 2 browser high marks, finding they are much more …News
Security Group: Human Error #1 Security Worry
The SANS Institute has some controversial advice for computer security professionals looking to lock down their networks: spear-phish your employees.That’s …News
Indian Outsourcer Satyam Expanding in China
Indian software and services outsourcer Satyam Computer Services will increase staff numbers in China to about 3,000 by 2008, from …News
Mexico Grows Into Outsourcing Option
For most people, outsourcing to Mexico still conjures up images of maquiladoras, the foreign-owned factories just across the border that …News
Microsoft Releases Six Security Updates
Microsoft has issued six security updates, fixing critical bugs in Windows components ranging from Internet Explorer to the Microsoft NetWare …News
Microsoft Says Code is Better, Not Perfect: Q&A
Over the past few years, Microsoft has aggressively sought to change the image that its products have poor security. The …News
Microsoft Puts Corporate AV Client into Beta
Microsoft on Tuesday will take a step toward competing with McAfee and Symantec in the enterprise security market by releasing …News
Court Shutters Alleged Spyware Operation
A U.S. district court has shut down a Web operation that is accused of secretly loading spyware and other malevolent …News
How to Minimize the Impact of Laptop Theft
Laptops have enabled us to work whenever and wherever we choose, greatly enhancing our productivity, but …News
U.S. Gov't IT Leaders Feel More Secure
More than half of IT leaders in the U.S. government are more confident about their agencies’ cybersecurity capabilities than they …News
Wi-Fi Hardware Holed by Security Flaw
Windows computers are open to direct attack from a hole in the widely-used Broadcom Wi-Fi driver, security researchers have warned.The …News
Microsoft to Release 6 Windows Security Updates
Microsoft will release six groups of security patches next Tuesday, fixing flaws in its Windows operating system.The updates will be …News
DriveSentry Offers 'Firewall' for Storage Drives
A Mountain View, Calif., startup company has developed what it calls a storage "firewall" to prevent computer viruses from wrecking …News
Antiphishing Fighters Target Malware
The volunteers behind the Phishing Incident Reporting and Termination Squad (PIRT) have started a new project to crack down on …News
U.S. FTC Settles with Adware Firm Zango
Adware distributor Zango will give up US$3 million in "ill-gotten gains" for deceptive downloads that displayed billions of …News
Microsoft Forefront Group Eyes Compliance Market
Security vendors Symantec and McAfee may soon find Microsoft competing with them in a new market.Microsoft has developed network-scanning technology, …News
Symantec CEO: Security Threat Changing
The threat posed to computer users and companies by hackers is shifting from attacks on the computers to attacks on …News
Mozilla: We'll Fix 2nd Minor Firefox 2.0 Bug
A second minor bug found in the Firefox 2.0 Web browser will be fixed, but users shouldn’t encounter much of …News
Pa. Water-System Network Hacked
An infected laptop gave hackers access to computer systems at a Harrisburg, Pa., water treatment plant earlier this month.The plant’s …News
IronPort to Acquire Postx
Looking to expand its security appliance offerings, IronPort Systems plans to acquire PostX, a vendor of e-mail encryption software.The all-stock …News
Vulnerability Found in Microsoft Visual Studio 2005
A vulnerability in Visual Studio 2005 could let an attacker execute code on a targeted Windows machine, Microsoft said Wednesday.Danish …News
U.S. FTC Releases Social-Networking Safety Game
The U.S. Federal Trade Commission (FTC) has launched an online quiz-show-style game to test teens and other users on the …News
Tricky New Malware Challenges Security Vendors
A tricky malicious program has become more prevalent in spam, but experts don’t know what its creators plan to do …News
BSA: More Police Action Needed in Singapore
Compared to other Asian countries, Singapore’s software piracy rate is relatively low, but the Business Software Alliance (BSA), an industry …News
Seagate Tries Encrypted Drive One More Time
Beginning early next year, Seagate Technology will begin shipping its first widely available hard drives with built-in encryption.The Momentus 5400 …News
Security Maven Schneier Goes to Work for BT
BT has bought Counterpane Internet Security, turning its high-profile founder and CTO Bruce Schneier into one of its employees.The U.S. …News
Data Breach Costs Up Year Over Year
Customers are voting with their feet when it comes to data breaches, according to the 2006 Cost of a Data …News
Scottish School 1st to Use Palm-Vein Biometrics
A Scottish school has turned to biometrics as part of a nationwide push to encourage children to eat healthier meals.The …News
Microsoft Office Antipiracy Checks to Become Mandatory
The Office worker productivity and collaboration suite is about to become the next piece of software from Microsoft subject to …News
Symantec Looks to Restore 'Swagger' in Europe
Symantec’s European team should take heed: Chief Executive Officer John Thompson has cracked the whip.During an earnings call on Wednesday, …News
U.S. Agencies Choose ActivIdentity for Smart Cards
The U.S. Department of Defense (DoD) and Transportation Security Administration (TSA) have chosen a smart-card authentication product from ActivIdentity as …News
Push for Changes to Personal Data Rules Gains Steam
Calls for a change to international rules on data transfers intensified Monday when two leading trade associations called on U.S. …News
Trial Challenging Child Online Protection Act Starts
A federal trial that began Monday in Philadelphia will decide whether operators of websites can be jailed and fined for …News
German Railway Tests Biometric Technology
Terrorists attempting to smuggle bombs into trains could be stopped in their tracks by intelligent surveillance technology being tested by …News
IBM Finishes Up ISS Buy
IBM has closed its US$1.3 billion acquisition of security vendor Internet Security Systems.The acquisition, which closed Friday, is the …News
Diebold E-Voting Source Code Leaked Again
Source code to Diebold Election Systems voting machines has been leaked once again.On Wednesday, former Maryland state legislator Cheryl C. …-
Palo Alto Networks
-
Palo Alto Networks
-
-
Palo Alto Networks
-
Palo Alto Networks
BrandPosts
Learn More
×
BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.
-
Sponsored By CSO Events
-
-
Sponsored By Avery Dennison