There's a "digital business" revolution coming and IT security professionals need to grasp the significance early on to be prepared to address whatever security needs arise. That was the message from Gartner analyst Jorge Lopez in the closing keynote at the Gartner Security and Risk Management Summit today.
Ellen Messmer |
27 Jun |
Read more
The Amazon AWS cloud service is fine for enterprise workloads and applying security controls such as encryption and firewalls is possible, though more security vendors need to step up to support Amazon's EC2 service, according to the Gartner analysis presented today.
Ellen Messmer |
26 Jun |
Read more
Gartner analyst Tina Nunno, author of a book called "The Wolf in CIO's Clothing," wants IT leaders to find their inner ferocious pack animal not only to be able to snarl at enemies challenging them but to better inspire team cohesion through displays of power, and yes, cunning.
Ellen Messmer |
26 Jun |
Read more
Former National Security Agency director Gen. Keith Alexander claims the media leaks by Edward Snowden about how the NSA conducts cyber-espionage have undermined national security .... and he ardently defends those NSA bulk collection practices.
Ellen Messmer |
25 Jun |
Read more
If the firewall isn't dead it may be old and sick and not up to the job anymore, while an emerging technology called "Runtime Application Self-Protection" (RASP) could take over most of its duties.
Ellen Messmer |
24 Jun |
Read more
Gartner has kicked off its annual Gartner Security and Risk Management Summit 2014 in National Harbor, Maryland, by pointing to the top threat challenges heading into next year -- and added that in the future, the term IT security will give way to "digital security" to encompass newer challenges, such as the Internet of Things.
Ellen Messmer |
24 Jun |
Read more
Having completed its acquisition of ThreatGRID this week, Cisco put forward plans for how the TreatGRID sandboxing technology will fit in the Cisco security portfolio. The company also acknowledged it's not entirely clear yet on what to do about the many technology-sharing relationships that ThreatGRID has had with other vendors, including Cisco competitor, Check Point.
Ellen Messmer |
19 Jun |
Read more
While there's a notion that a dearth of cybersecurity professionals the shortage is most acute at the "high end" where $250,000 salaries are not uncommon for those who combine technical and managerial skills.
Ellen Messmer |
18 Jun |
Read more
Waratek is introducing its first product aimed at Java application security, and it works by identifying weaknesses, especially in open-source platforms, and then acts like a shield against attacks.
Ellen Messmer |
17 Jun |
Read more
Palo Alto Networks' annual threat analysis of customer network traffic shows that botnet-controlled malware that makes its way into enterprise networks almost always uses the User Datagram Protocol (UDP) to communicate, blending in with legitimate UDP-based applications such as video.
Ellen Messmer |
03 Jun |
Read more
The abrupt discontinuation of the disk and file encryption freeware TrueCrypt by its secretive software developers has left many security experts stunned, some of whom say there now are no viable alternatives left in non-commercial encryption software.
Ellen Messmer |
31 May |
Read more
The Linux Foundation today announced the first protocols that it wants to address as part of its open-source code testing and security review. Not surprisingly, OpenSSL, where the infamous Heartbleed bug was discovered, is among them.
Ellen Messmer |
30 May |
Read more
Juniper Networks and Palo Alto Networks today agreed to settle their long-running firewall-related patent infringement lawsuits against each other, with Juniper saying Palo Alto Networks has agreed to pay US$175 million in cash and equity as part of the settlement.
Ellen Messmer |
29 May |
Read more
While small- to midsized businesses (SMB) don't have the luxury of information security teams and resources that large enterprises can afford, they still face many of the same threats.
Ellen Messmer |
29 May |
Read more
Sophos has added file-level encryption to its mobile security software so that users of Android or Apple iOS devices with Sophos Mobile Control 4.0 can share encrypted files.
Ellen Messmer |
29 May |
Read more