Recent Articles
-
Obama to Appoint Schmidt Top Cyber-security Officer
Howard Schmidt, the former Microsoft chief security officer, is reportedly returning to Washington, D.C., for a second tour of duty as the nation’s cyber-security czar, according to published reports. President Obama, under pressure in the wake of highly publicized breaches of military Predator drones by al-Qaeda operatives, is expected to name Schmidt to fill the…
-
Cybercrime Vulnerabilities and Targets in 2010
Cybercrime Vulnerabilities and Targets in 2010 Cloud, Virtualization Drive CyberCrime in 2010Cloud and virtualization may promise big business benefits for 2010, but a new future threat report from security vendor Trend Micro says the buzzed-about technologies may increase cybercrime by criminals looking for the next big cyber-swindle. Channel Insider takes a deeper look at the…
-
New Guidelines for Securing the Cloud
The Cloud Security Alliance has released the second version of its cloud computing security guidelines. The document is not a prescription for securing cloud computing assets or applications, but rather guidelines for determining risk exposure and tolerance for enterprises adopting cloud computing services. The 76-page document is exhaustive review of cloud security considerations ranging from…
-
VSAs to Crush Security Appliances
As the virtualization market continues to mushroom, security is taking on a bigger role, with the virtualized security appliance (VSA) set to ‘deliver a strong left hook to traditional security appliances’, according to a new report from IDC. The research company says 72.4 percent of respondents are currently allocating funding for VSAs in their budgets…