Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.
Ellen Messmer |
08 Aug |
Increasingly, businesses accept the idea that employees should be able to <a href="http://www.networkworld.com/columnists/2011/072711-andreas.html?hpg1=bn">use their personal mobile devices</a>, such as <a href="http://www.networkworld.com/slideshows/2010/061510-smartphone-history.html">smartphones</a> and tablets, for work. But debate is raging as to whether these employee-owned devices should be <a href="http://www.networkworld.com/news/2011/061511-smartphones-tablets-security.html">managed and secured</a> exactly as corporate-owned devices might be.
Ellen Messmer |
28 Jul |
Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job. With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet. In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.
Rodney Gedda |
20 Jan |
Contributions from free and open software makers can be found throughout the tech world. From your datacenter to the desktop and everywhere in between; there's an open solution to your computing needs. This is no less true in information security. My focus in this article is the several outstanding information security desktop tools that personify the innovation and ingenuity of the FOSS (Free and Open Source Software) world. Please keep in mind that all of these applications (except one) are cross-platform so you can find appropriate versions on whatever you run (BSD, Mac OSX, Linux or Windows). The examples herein, however, will be catered to the largest install base (statistically): Microsoft Windows.
Joseph Guarino |
01 Apr |
For both enterprises and consumers, one of the big draws of Windows 7 has been its tighter security features.
Shane O'Neill |
04 Feb |
More Application Security features
The retail industry is a prime target for fraud and data breaches – it is the second most targeted sector aside from finance.
Rick Chavie |
18 Nov |
Smart city projects are among the most exciting technological initiatives around today and will play a major role in the world’s future growth and security. Modern technology lets us track and monitor many elements in a major urban environment – noise, light, traffic, weather, accidents and incidents, and use this data to improve people’s living and working conditions.
Gordon Makryllos |
24 Oct |
While the rise of mobile enterprise adoption and BYOD means more flexibility for employees and generally higher productivity for organisations and businesses, it also poses security challenges, in particular around identity and access management (IAM).
Travis Greene |
07 Oct |
Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.
Wana Tun |
03 Oct |
It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism
David Balazsy |
03 Oct |
More Application Security opinons