Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
Oracle yesterday announced plans to adopt a quarterly security patch cycle. The enterprise software giant says that adopting a fixed delivery schedule will make it easier for customers to plan updates and thereby help them reduce costs. . . .
When I moved into a new neighborhood last week, I expected the usual hassles. Then I found out I'd have to wait more than a month for a DSL line. I started convulsing. If I don't have Net access for even one day, I can't do my job. So, what was I supposed to do? There's an Internet café on the next block, but they close early. I had no choice--it was time to start sneaking on to my neighbors' home networks. . . .
A vulnerability rated as a low risk this morning could turn into your worst nightmare tonight. To meet the ever-increasing speed with which exploits are written and propagated, traditional network-based vulnerability scanners have morphed into more full-scale vulnerability management products. . . .
Corporations often need more wide area network (WAN) bandwidth but are deterred by its high cost and slow speed. Pricing for these lines runs from hundreds to thousands of dollars per month, and typically the links deliver 1.5 mbps (megabits per second) of throughput. . . .
Cisco has discovered a security flaw in its Cisco Security Agent software (CSA. This could be exploited by attackers to circumvent the security provided by the host-based intrusion prevention product. The network giant has issued a patch to fix the vulnerability. . . .
Authentication developers are preparing new systems that offer enhanced data security but reduce the burden strict access controls traditionally place on users. . . .
Corporate IT managers are a bit bi-polar when it comes to network security, said a survey released this week at the Computer Security Institute's annual conference in Washington, D.C. . . .
Four rivals in the application security market joined forces to help define more consistent and reliable best practices for Web application security. The partnership, announced Monday at the Computer Security Institute's 31st annual security conference and exhibition in Washington, includes F5 Networks, Imperva, NetContinuum and Teros. . . .
Security developers took more than a decade to move from intrusion detection to intrusion prevention in the world of wired networking. But in the fast-paced wireless space, vendors are already jumping on prevention as the first step in security. . . .
Former security advisor to the White House Richard Clarke said the number of zombie networked machines has risen to 15 times greater than last year's figure of 2,000 compromised PCs. . . .
One year after a vulnerability in the Wi-Fi Protected Access encryption algorithm was reported, a proof-of-concept program for the attack has been released. . . .
Newbury Networks, a provider of wireless-network management and security solutions, announced Monday a new version of its location-based security and containment product for WLANs. . . .
With fears of terrorism still in the air, vendors at this week's International Security Conference touted new surveillance technologies being used in transportation and logistics to pinpoint suspicious packages, peer inside transport vehicles and positively identify people even through darkness and fog. . . .
A federal grand jury has indicted a former University of Texas student on charges he hacked into the university system and stole Social Security numbers and other personal information from more than 37,000 students, faculty and staff. . . .
In the past couple of years, technologies such as intrusion detection and protection systems have become mainstream tools in the corporate security arsenal. But many feel less than satisfied with the performance of some of these technologies. . . .
IDC's projections of the rise in spending on security services reflect the growing need that businesses have to forge relationships with security professionals. "At the mid-market level, a lot of companies don't have a dedicated person handling security," says IDC analyst Christine Tenneson. . . .
Although potential wireless network users are being deterred by concerns about network security, companies continue to adopt the technology for data and voice. . . .
As enterprises scramble for security specialists to help lock down their networks, managed security services providers are developing increasingly sophisticated tools that take the burden off IT staffs entirely. . . .
There is no question that a number of the new mobile solutions that are being developed could help many business processes function more efficiently. . . .