There are lots of ways business networks can be compromised, and more are developing all the time.
They range from technology exploits to social engineering attacks, and all can compromise corporate data, reputation and the ability to conduct business effectively.
Tim Greene |
14 Apr |
Read more
Cisco is beefing up its Wide-Area Application Services WAN-acceleration gear that improves branch-office application performance by adding encryption and better monitoring tools.
Tim Greene |
26 Jul |
Read more
The marriage of <a href="http://www.sonicwall.com/" target="_blank">SonicWall</a> and <a href="http://www.aventail.com/" target="_blank">Aventail</a> could result in a new network access control (NAC) vendor after the companies have the chance to assess and integrate their respective technologies.
Tim Greene |
15 Jun |
Read more
The Storm worm is fighting back against security researchers that seek to destroy it and has them running scared, Interop New York show attendees heard this week.
Tim Greene |
25 Oct |
Read more
Despite official urging, telecommuting within US federal agencies is languishing, in part because standards for how to secure mobile endpoints don't exist -- mainly the laptops telecommuters would use when outside the office.
Tim Greene |
04 Oct |
Read more
A presentation scheduled for Black Hat USA 2007 that promised to undermine chip-based desktop and laptop security has been suddenly withdrawn without explanation.
Tim Greene |
02 Jul |
Read more
Chief security officers need to comb through the wording of the governmental and industry security regulations their businesses must comply with if they want to secure their networks and stay out of legal trouble.
Tim Greene |
25 May |
Read more
Businesses may unwittingly leave themselves open to application-layer attacks because they don't understand their networks lack defenses to deflect them, according to a study by Forrester Research.
Tim Greene |
22 Mar |
Read more
VOIP gear from major vendors can be made secure, but it doesn't come out of the box that way, experts warned at RSA Conference 2007.
Tim Greene |
15 Feb |
Read more
Insecurely written software still looms as one of the greatest threats to Internet commerce, and user-generated Web content is becoming a vast new vulnerability hackers want to exploit, according to experts at RSA Conference.
Tim Greene |
08 Feb |
Read more
Remote access IPSec VPNs are no longer on the radar screen of companies that seek the advice of consultants at Gartner, according to a new report.
Tim Greene |
05 Jan |
Read more
Network access control stands out as one of the most promising security technologies, but it also is one of the most misunderstood. That's in part because vendors want in on the NAC buzz and are clamoring for attention, despite selling products that are only peripheral. This raises problems for companies that want to consider NAC but don't have a solid sense of what it is, what it might do for them and what kind of investment it requires.
Tim Greene |
21 Nov |
Read more
Why do people throng to the Black Hat conference Las Vegas in August? To protect their key business assets from attackers, according to a survey conducted Wednesday at the show.
Tim Greene |
07 Aug |
Read more
WatchGuard, makers of multi-function security devices for branch offices, is accepting a deal to be bought by a private investment firm.
Tim Greene |
27 Jul |
Read more
New PC indexing tools such as Google's Google Desktop Search pose security risks to businesses that use SSL remote access because the tools copy material accessed during SSL sessions and make it available to unauthorized people who later use the same PC.
Tim Greene |
16 Nov |
Read more