Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
Disgruntled or former employees pose a threat to any business and can gain access to internal systems relatively easily. Confidential company information can be used maliciously by employees either hacking into servers and files or by utilizing hacking tools readily available via the Internet and with a higher concentration of computer literate workers these risks are even more significant. . . .
This week, Symantec has unveiled its new corporate positioning. Long regarded as one of the leaders in the security technology space, the vendor has been building out its portfolio of offerings to drive security deep into organisations, whilst maintaining the high levels of computer systems availability that companies need to keep their businesses running efficiently. . . .
Japanese mobile operator NTT DoCoMo, Intel and IBM have started promoting a jointly developed specification for increasing the security of mobile commerce applications. . . .
California state officials revealed Tuesday that in August a hacker broke into a University of California, Berkeley, computer containing a database with the names and Social Security numbers of some 1.4 million Californians. . . .
The goal is a "single, coordinated solution" that enables network administrators to control both Windows installations and Cisco network architecture, the two tech giants said. The companies will also strive to draft and have implemented industry standards for network admissions and access control. . . .
I recently installed a remote home camera security system using wireless Internet cameras and a fine free software application for Linux called ZoneMinder. The cameras are installed at a friend's house, and the application runs at mine. ZoneMinder is powerful, feature-rich, and sophisticated. . . .
"We've had a focus on education because we felt if we could demonstrate to the marketplace that we could sit in the wildest of environments, it would demonstrate true security functionality," said DeepNines President Dan Jackson. . . .
Network architect Todd Sanders uses well-known open source tools, like Snort and Nessus, to build secure networks. But Sanders, who works for Centrepetal Solution Strategies LLP, a systems integration and systems security firm in Bowie, Md., is willing to take roads less traveled. . . .
CYBER attackers are launching more sophisticated attacks for financial gain with exploits that are being created easier and faster than ever before, and their single biggest target is e-commerce. . . .
There's no way that Todd Sanders would ever think of building network security and monitoring applications for businesses without using open source tools. Besides being free or inexpensive, open source tools such as Snort, Nessus and F-protect have worked better than proprietary alternatives. . . .
Three years ago, the lead network technician on my campus network spent 95% of his time installing, configuring and tweaking network-attached devices. Today, he spends 95% of his time securing them. . . .
The specter of drive-by computer hackers cruising upscale Scottsdale neighborhoods to cherry-pick wireless Web systems has residents worried about a new method of privacy intrusion and identity theft. Residents of Scottsdale's Stonegate neighborhood filed a police report after their home computers were accessed by so-called "wardrivers," computer hackers who detect unprotected wireless Internet connections. . . .
A pair of vulnerability-assessment and remediation tool vendors are separately upgrading their products so that customers more easily can prioritize which networked systems need to be fixed. . . .
Businesses and government agencies must re-examine the growing threat of cyberterrorism to automated computer systems running power grids, dams and other industrial facilities, security experts said Tuesday. . . .
The Unix operating system has so many descendants and variations that organizations navigating the maze of choices can quickly become disoriented. Many of these projects were launched to offer operating systems unencumbered by the commercial and proprietary licenses tied to the original AT&T UNIX. . . .
Network Physics has introduced NetSensory Enterprise Architecture, a distributed intelligence tool that promises to provide global applications infrastructure visibility, troubleshooting and reporting. . . .
Corey Mandell knew things weren't good when he got the ransom letter. Mandell had experienced such things before, and he knew that Authorize.Net, a Bellevue, Wash., credit card processing company, would be in for a tough time. What he didn't realize until later is that it would be much worse than he had anticipated. . . .
Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. While driving into the office, half-listening to the radio news, you hear your bank's name being announced, immediately followed by the words "hacker", "massive system failure" and "identity theft". . . .