It's difficult to define what the "cloud of tomorrow" will look like because of all the changes happening in the IT industry -- changes to fundamental application architecture, service models and interactions between components. The cloud continues to disrupt IT in new ways so predicting tomorrow is a perpetual moving target.
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina.
Spending on cloud services is so far just a fraction of total IT spending -- roughly 3% -- but the market is growing. IT pros explain what they like about their favorite cloud-based security, storage and management services.
Plugging network security leaks is an essential responsibility for companies, private organizations and technology professionals. Achieving that goal requires discovery tools that scour every asset, including those not currently under management, and also map connectivity between institutions involved with an organization's sensitive information around IT compliance, corporate security, product development, critical infrastructure protection and other relevant issues.
The popular services of Google, Facebook and Twitter are improving in terms of security, says Scott Behrens, head of Neohapsis Labs, which took a security snapshot of them on May 28 through an analysis that included looking at server headers sent during responses to the websites.
Most enterprises have enough security technology in place to protect their businesses. They also have plenty of data from SIEMS and logs and other devices that tell them what's going on in their environments. What they need now is an automated method to use the vast amounts of event data.
Whether you're buying or selling hardware and software, or acting as systems integrator, the new supply-chain security standard put forward by the Open Group in April could end up having a huge impact on you. Here are a few frequently asked questions that explain why.
Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide next-generation security for all endpoints, whether PCs, tablets or ATMs.
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect potential security threats.
Businesses move quickly, and those that make missteps along the way or fail to adapt to the times rarely go unscathed. Consider the fate of the original 12 companies listed in the Dow. While General Electric is still an independent company, most of the others have been acquired by larger companies or have vanished altogether.
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries.
Phishing attacks victimize the email recipient who opens the message AND the company whose domain name has been spoofed in the attack. If enough people get malicious emails that appear to come from legitimate companies, people simply begin to ignore email from them. Now the DMARC email specifications help prevent that kind of brand abuse.
Fighting denial-of-service attacks has become a matter of survival for some businesses that find their websites getting smashed and network flooded by attackers. Online gaming company SG Interactive says it's under constant attack and the only way to keep going is to set up an anti-DDoS defense.
Bryan Sartin is director of Verizon's RISK Team, the communications provider's computer forensics practice, which is also the group that helps create the annual Data Breach Investigations Report (DBIR). Network World Editor in Chief John Dix caught up with Sartin to learn more about the RISK Team, get his take on the state of enterprise security, and discuss new findings from the recently published DBIR report.
In the battle for the next generation of enterprise IT, John Stratton carries a lot of weapons. Stratton is president of Verizon Enterprise Solutions, the nearly $30 billion unit formed just over a year ago to deliver networking, cloud, mobility, managed security, telematics and a host of other services in a more coordinated fashion for Verizon's top enterprise buyers. Building on a traditionally strong base of wired and wireless network services, Verizon Enterprise also blends in acquired assets like cloud hosting company Terremark, security company Cybertrust and Hughes Telematics. In this installment of the IDG Enterprise CEO Interview Series, Stratton spoke with Chief Content Officer John Gallant about Verizon Enterprise's progress since its inception, including a dramatic streamlining of internal systems and processes designed to make life much easier for the company's customers. Stratton also discussed the company's suite of services aimed at simplifying life for IT teams struggling with mobility and the influx of consumer devices, and he talked candidly about the prospects for a third mobile platform to rival Apple's iOS and Google's Android. He also talked about how cloud is reshaping the IT landscape and hinted at a series of major upcoming cloud announcements from Verizon Enterprise. Also, he explained how the "Internet of Things" is creating powerful new business opportunities for Verizon and its enterprise customers.
Many companies are anxious to take advantage of big data cloud services to crunch vast amounts of data for analysis. However, the lack of inherent data security can be a deal-breaker. Now there's a new service that provides integrated data encryption throughout the processes and infrastructure of Amazon EMR. Service subscribers maintain complete control of their encryption keys, thus bolstering the security of their data.
You don't have to look further than the uprisings across the Arab world to recognize the power of social tools, and this transformative power applies to business as well. But for an enterprise social network (ESN) to be genuinely useful, it needs to go beyond the "Facebook for enterprise" model.
Cisco, which wants to expand its clout into the industrial networks used by power-generation utilities to support the electric grid, today announced an expansion of its "smart grid" portfolio with ruggedized and low-latency switches and other equipment intended for use in electric-power distribution systems.
A 41-year-old man was arrested for allegedly disrupting his former employer's network after he was passed over for promotions, leading him to quit his job and take revenge, the U.S. Federal Bureau of Investigation said.