Hi, what are you looking for?
Recovering from a breach can be expensive, just ask Sony or any other company that has fallen victim to a cyber attack recently. Not only are the costs stemming from investigations, breach notifications and fines expensive for organizations, the damage done to a brand and loss of customer confidence can be incredibly costly.
Seattle based WatchGuard Technologies, on Monday announced that it has extended its next-generation firewall (NGFW) capabilities, including advanced firewalling, application control, and intrusion prevention system (IPS), to its XTM 8 Series of security appliances, making enterprise-class NGFW features available to businesses that perhaps aren’t big enough to justify the investment in a typical enterprise-class firewall.
Google today said it had acquired the domain name “G.CO”, a name that the company says it will use exclusively to link to official Google products and services, helping users be more confident that when they click on a "G.CO" link, they are taken what should be a safe URL, operated by Google.
The battle for top talent in the tech industry isn’t limited to Facebook, Apple and Google quarreling to hire and retain top talent. Splunk, a provider of operational intelligence software, today announced that it has hired David Conte as the company’s first Chief Financial Officer.
Cloud-based threat management company, Zscaler, today said it has hired John Vecchi as Vice President of Worldwide Marketing, where he will responsible for driving the company's market-expansion initiatives.
RIM this week released a security advisory to address a vulnerability in the BlackBerry Administration API included in the BlackBerry Enterprise Server that may allow an attacker with user permissions granted to the BlackBerry Administration API to disclose sensitive information or cause a denial-of-service condition.
It looks like Netflix isn’t the only company jacking up its rates this week. VeriSign, the Internet infrastructure giant that ICAAN recently awarded (via renewal) the contract to serve as the authoritative registry operator for the .net registry for another six years, said it would be raising the fees for its domain registration services.
We all have relatives who never see a doctor because they just don’t want to know if there is something really wrong with them. Living a left-brain life (i.e., logical, analytical), I always cringe and unsuccessfully suggest the ‘more information is better’ approach to medical care when my relatives channel their ostrich spirits. Somehow the concept of plausible deniability breaks down when thinking about the early detection potentially fatal disease. Just another confirmation of my adoption.
Below is a Full Text Transcript of Remarks on the Department of Defense Cyber Strategy from Deputy Defense Secretary William J. Lynn III, as the Defense Department's Strategy for Operating in Cyberspace was revealed at National Defense University at Fort Lesley J. McNair in Washington.As Delivered by Deputy Secretary of Defense William J. Lynn, III, on Thursday, July 14, 2011
Add mice and keyboards to the list of UBS-based peripherals now suspect in any corporate environment. In recent weeks several gadget blogs have been discussing new ways to make the USB HID (Human Interface Device) a viable vector for malware. This is hardware hacking that should be of interest to corporate IT staff. While some of these use cases are not elegant, requiring someone to convince someone else to use a modified device, we've seen clever social engineering in the...
The wait is over. New guidance on virtualization from the PCI Council is here.
The results of a recent survey released today by Men's Health Network and Cephalon, found that shift workers, people who work non-traditional hours including IT professionals working overnight shifts, report that these shifts can negatively impact their health, work and well-being.
Related Resource: The Top 10 Reports for Managing Vulnerabilities
At Cisco Live, the company's annual IT and communications conference, Cisco today introduced new technology to increase the efficiency and security of cloud-based networks, including new email security features for its IronPort Email Security solution.