Failure of Senate to pass Cybersecurity Act leaves us all at risk
The Senate failed to muster enough votes to pass the watered-down Cybersecurity Act of 2012 (S. 2105) earlier this month, which reminds me of the line by Col. Nathan R. Jessep in the movie "A Few Good...
View ArticleThe security game changes when the bad guys are backed by foreign governments
Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most...
View ArticleThese companies help with everything from BYOD to MPLS backup, security...
I get to meet a lot of interesting companies in my capacity here at Network World, some of them newcomers, some more established. Here's a roundup of a few that are addressing common problems.
View ArticleHuawei too dangerous to do business with?
The controversy swirling around use of Huawei telecom gear raises some interesting questions about the global nature of business and the future of cyberwarfare.
View ArticleBig Data the security answer?
The recent RSA conference in San Francisco was awash in talk of big data, but it was clear there was some disagreement about what people mean by big data and some outright skepticism about it being the...
View ArticleWho has responsibility for Cloud security?
As more organisations leverage the Cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts.
View ArticleWhy don't risk management programs work?
When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network...
View ArticleCloud computing causing rethinking of disaster recovery
Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.
View ArticleCapital letter 'S,' 'D,' 'N' will never happen: VMware exec
Rack and stack that network and then walk away and leave it alone. VMware's NSX technology will provide all the control necessary going forward, says Steve Mullaney, senior vice president and general...
View ArticleNew methods for addressing insider threats: A roundtable discussion
Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This...
View ArticleSecuring the virtual world
Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.
View ArticleEarly user of VMware NSX net virtualization tool extols fine grain controls
Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in...
View ArticlePalo Alto says its new endpoint protection tool can stop the bad stuff in its...
The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor...
View ArticleNew England security group shares threat intelligence, strives to bolster...
The Advanced Cyber Security Center is a three year old organization with a bold mission to "bring together industry, university, and government organizations to address the most advanced cyber threats"...
View ArticleHow well does social engineering work? One test returned 150%
A conversation with a white hat hacker
View Article
More Pages to Explore .....