Ellen Messmer

Senior Editor, Network World

Ellen Messmer is a senior editor at Network World. She covers news and technology trends related to information security.

Certificate Authority Security Council backs SSL server rules taking effect Nov. 1

The Certificate Authority Security Council weighs in on new SSL server certificate rules.

Microsoft’s strategy on identity management aimed squarely at cloud-based services

Microsoft’s strategy on identity management aimed squarely at cloud-based services

Microsoft’s strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based mobile devices as well as Apple iOS...

IBM opening two state-of-the-art disaster recovery/resiliency centers

IBM opening two state-of-the-art disaster recovery/resiliency centers

IBM is about to cut the ribbon officially opening two new state-of-the-art data centers intended to provide disaster recovery and resiliency services, one in the Raleigh, N.C., area and other in Mumbai, India.

Testing service rolls out vast federated identity management system using Oracle

The Educational Testing Service, a non-profit organization that provides academic assessment tests, says it has gained efficiencies by centralizing its identity and access management (IAM) for on-premises, cloud and hosted...

Does your business need a “Data Protection Officer?”

Anticipated new EU regulation may mean you do, notes consultancy PricewaterhouseCoopers.

Top techs the CIA thinks are hot

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT money....

‘Unusual uptick’ in attacks on media, publishing, Cisco says

‘Dynamic DNS’ also becoming exploited by cyber-criminals for botnet operations.

New products of the week 08.04.2014

New products of the week 08.04.2014

Our roundup of intriguing new products from companies such as EMC and RSA.

Top Techs the CIA Thinks Are Hot

Top Techs the CIA Thinks Are Hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies  deemed useful to  government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT...

Homeland Security wants corporate board of directors more involved in cyber-security

DHS will include the National Association of Corporate Directors “Directors’ Handbook on Cyber-Risk Oversight” handbook on the U.S. CERT website.

New products of the week 07.28.2014

New products of the week 07.28.2014

Our roundup of intriguing new products from companies such as Juniper and Fortinet

Is “Bring Your Own Identity” a security risk or advantage?

Questions abound over websites authenticating users via identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo Ponemon Institute survey shows.

New SSL server rules go into effect Nov. 1

Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don’t conform to new internal domain naming and IP address conventions designed to safeguard...

Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing

Pedro Bustamante, director of Special Projects at Malwarebytes, said, “Our score in this test is clearly skewed by the fact that Malwarebytes Anti-Malware Free is the only product being tested without real-time protection. It is...

Top Techs the CIA Thinks Are Hot

Top Techs the CIA Thinks Are Hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT money....

Cybercrime wave whacks European banks

Cybercrime wave whacks European banks

Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a...

Ping Identity rolls mobile one-swipe authentication; takes aim at RSA tokens

PingID for Apple iOS or Google Android mobile devices is an app that works to generate one-time passwords on a smartphone

Survey: Corporate security thwarted by dialog failure between IT dept. and management

Ponemon survey of 4,881 IT and security practitioners also shows many want total security-product overhaul to counter advanced persistent threats.

Juniper boosts DDoS Secure appliance to mitigate UDP-based amplification attacks

DDoS mitigation filters can be applied closer to attack’s source.

U.S. malware share rising, Amazon service No.1 in hosting it

Solutionary’s Top 10 list also includes Google and Akamai.

Load More