加载中...

Security Experts:

Management & Strategy
long dotted

NEWS & INDUSTRY UPDATES

The results of a recent survey show that organizations following best practices for protecting endpoints are protecting critical assets and information. However, when those protections fail, it’s still a costly situation.
AVG Technologies has filed an IPO Registration Statement on Form F-1 with the U.S. Securities and Exchange Commission in connection with a proposed initial public offering.
Splunk, a fast growing provider of software that helps organizations gather and make use of machine data from a diverse set of sources, has filed an S-1 registration statement with the SEC and is soon to go public.
Following a series of highly publicized cyber attacks that occurred over the holidays, Stratfor today launched a rebuilt version of its website.
ThreatMetrix has acquired TrustDefender, an Australian-based company that offers “secure browsing technology” designed to protect against malware and stop attacks including man-in-the-browser (MitB) attacks.
Splunk, the fast growing provider of software that helps organizations gather and make use of machine data from a diverse set of sources, has launched the latest release of its flagship product, Splunk Enterprise.
The latest edition of Oracle Database Firewall introduces support for MySQL and brings new reporting capabilities, including new reports that help organizations more efficiently address regulatory compliance.
NetQin Mobile, a China-based provider of consumer-focused mobile security software, has undergone a name change and has hired the former Chief Product and Technology Officer of Samsung Mobile, as Co-Chief Executive Officer.
Defense contractor Raytheon continues to gobble up cyber security services firms, today announcing that it has acquired privately held Henggeler Computer Consultants, Inc., a contracting firm that provides enterprise architecture, analytics, software, cloud-based development solutions.
Several vendors are currently working to resolve a hash collision vulnerability, which if exploited can trigger a denial-of-service condition on multiple platforms.

FEATURES, INSIGHTS // Management & Strategy

Steve Ragan's picture
After the breach, RSA has added some 1,000 new SecurID customers to its client base. Looking ahead, RSA is focusing on stronger intelligence controls and automated threat response.
Chris Poulin's picture
The concept of a data diode isn’t new, but it’s been adopted recently in the critical infrastructure sector, and in so doing limiting the visibility needed to protect against targeted attacks. Data diodes may help protect critical infrastructure from certain attacks, but are they really practical?
Jon-Louis Heimerl's picture
We have been thinking about information security for literally thousands of years. As world continues to evolve, Information Security must evolve to keep up with it.
Oliver Rochford's picture
Most businesses do not appear to have anything even remotely resembling a real security strategy. In the case of Information Security, you must first define your goals. These goals have to be realistic and inline with the resources at your disposal.
Chris Hinkley's picture
Great security means first identifying your needs and then making a resolution to revamp or create your company’s plan for the New Year.
Wade Williamson's picture
As malware gets progressively more complex, it’s important to understand how the major players in the malware industry fit together and how these relationships affect the ways that malware is developed, distributed and ultimately used in attacks.
Idan Aharoni's picture
With 2011 drawing to an end, I thought it would be an interesting opportunity to look back to my 2011 predictions and see how each of them panned out. So how did I do in my Optimist's Cybercrime Predictions for 2011?
Jon-Louis Heimerl's picture
Twas the night before Christmas, when all through the house Not a creature was stirring, not even a mouse. The data was all safe, protected with care, In hopes that year-end bonuses soon would be there....
Chris Hinkley's picture
There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. There are some things which every CIO has control over, however. Here are four things I wish every CIO would make into a habit when it comes to security.
Noa Bar-Yosef's picture
There was never a dull moment in 2011. With all the hacks this year, is it even possible to choose the seven prime hacks of 2011? It’s not an easy task, but let’s take a crack at it.

Delivered Twice Each Week, the SecurityWeek Briefing Won't Flood Your InBox, But Will Keep you Well Informed on What's Happening in the Industry, Along with Insightful Columns from Industry Experts.

Privacy: We never sell or share your personal information or email address with any other company and you can unsubscribe instantly at any time.