Top Five Things to Consider For Your Data Center Security Spend

 

No matter which way you slice and dice the numbers, the data center is typically one of the most costly items within an enterprise IT budget. The costs are high not only from a CapEx perspective but also from the day to day operations of keeping servers up and running.

When faced with the daunting costs of a data center, it can be easy to allocate for security only as an afterthought, or to only assign a small percentage of the ...

Continue Reading →
0

Want to Strengthen Defenses? Think like an Attacker.

The recent increase in the number and severity of cyber attacks around the world demonstrate that we’re squarely in an era referred to as the “industrialization of hacking” which has created a faster, more effective and more efficient sector profiting from attacks to our IT infrastructure. Driven by the desire for economic or political gain or attention to their cause, hackers are executing more sophisticated and damaging attacks that at the same time are becoming easier to launch with widely ...

Continue Reading →
0

The Firewall: From Past to Present… and Beyond

 

The firewall – it’s been around since the dawn of the commercial internet, but it has been and remains a vital layer in the network security defense.

There has been recent discussion about its place in the network today, but as with any technology that stays viable in new times, the firewall has evolved. Let’s take a quick trip back in time to understand how far the firewall has come and then fast-forward to what we can expect in the future.

• ...

Continue Reading →
0

McAfee, NIST partner to boost U.S. cyberdefenses

 

Security firm McAfee is working with the National Institute of Standards and Technology to try to shore up America’s defenses against cyberthreats.

McAfee announced today that the company is now part of the the National Cybersecurity Excellence Partnership and will join cybersecurity professionals from both the private and public sector to tackle the escalating problem of computer-based threats.mcafeelogoco_270x203

The partnership is part of the National Cybersecurity Center of Excellence, which is hosted by NIST ...

Continue Reading →
0

U.S. Air Force designates six cybertools as weapons

New designations should allow the programs to better compete for
increasingly scarce Pentagon funding, an official says.

Six cybertools have been designated as weapons by the U.S. Air Force, allowing the programs to better compete for increasingly scarce Pentagon funding, an Air Force official said on Monday.

Lt. Gen. John Hyten, vice commander of Air Force Space Command, told a conference held in conjunction with the National Space Symposium that the new designations ...

Continue Reading →
0

Botnet now spreading Android trojans

The Cutwail botnet, which has already been spreading the banking trojan known as Zeus, is now also trying to pass around a new Android trojan called Stels. Stels infects Android devices by pretending to be an update for Adobe Flash Player. In case potential victims aren’t on an Android device, the developers of the malware have come up with a backup plan – if the dangerous spam links are opened in a browser, such as Internet Explorer, on a desktop ...

Continue Reading →
0

No Organization Is Ready for BYOD

The Risks Are Not Worth the Reward

Android is cool, iPhone is cutting-edge and carrying a tablet is convenient. What’s not so cool, cutting-edge or convenient, however, are data breaches, which as everyone already knows lead to millions of dollars in damages year after year. The odd thing about data breaches, though, is that despite the fact that enterprises, SMBs and government agencies are more aware of them, they continue to allow the use of BYOD technologies, which increase the likelihood ...

Continue Reading →
0

Anonymous hacker group attacks Israeli websites

Hacking group Anonymous has launched a series of cyber attacks against websites in Israel.

Data bombardments briefly knocked some sites offline and led to others being defaced with pro-Palestinian messages.

The OpIsrael campaign was launched by the hacking collective in retaliation for attacks on Gaza.

The cyber attacks come as the Israeli army updates its web campaign adding “achievements” and “badges” for regular visitors.

Propaganda war

Anonymous said it had launched the OpIsrael campaign following threats ...

Continue Reading →
1

Virtual vs. Virtualized Security

By Shaun Donaldson on April 05, 2013

I have a pet peeve about virtualization and security, and it happens to be a minor thing with syntax. It comes down to this question; what is the difference between virtual andvirtualized, and why does it matter in in the language of security?

From our friends at TheFreeDictionary:

1. Existing or resulting in essence or effect though not in actual fact, form, or name: the virtual extinction of the buffalo.

2. Existing in the mind, especially as a product of the imagination. ...

Continue Reading →
0

Academic Possibilities for Professional Success

Dear Mazen Omar,

In reference to our telephonic conversation, I will be sending your profile to some of the world’s leading universities that can provide you accelerated and recognized Masters Degree on 50% scholarship, on the basis of your work experience only.

Dear Mr. Eyad,

With respect to our conversation over the phone, we have shortlisted your profile for a managerial position in an I.T company. Also your profile has been forwarded to the top online universities for the scholarship program. Enroll yourself ...

Continue Reading →
3
Page 5 of 11 «...34567...»