Security

Recent Articles

  • Obama to Appoint Schmidt Top Cyber-security Officer

    Howard Schmidt, the former Microsoft chief security officer, is reportedly returning to Washington, D.C., for a second tour of duty as the nation’s cyber-security czar, according to published reports. President Obama, under pressure in the wake of highly publicized breaches of military Predator drones by al-Qaeda operatives, is expected to name Schmidt to fill the…

  • Cybercrime Vulnerabilities and Targets in 2010

    Cybercrime Vulnerabilities and Targets in 2010 Cloud, Virtualization Drive CyberCrime in 2010Cloud and virtualization may promise big business benefits for 2010, but a new future threat report from security vendor Trend Micro says the buzzed-about technologies may increase cybercrime by criminals looking for the next big cyber-swindle. Channel Insider takes a deeper look at the…

  • New Guidelines for Securing the Cloud

    The Cloud Security Alliance has released the second version of its cloud computing security guidelines. The document is not a prescription for securing cloud computing assets or applications, but rather guidelines for determining risk exposure and tolerance for enterprises adopting cloud computing services. The 76-page document is exhaustive review of cloud security considerations ranging from…

  • Looking Back: Top 10 Security Stories of 2009

    McAfee Reinvigorates the Rivalry with Symantec This year Symantec and McAfee reignited their old rivalry to levels not seen since pre-Veritas days. One only need look at Symantec’s sneaky tactic in Vegas during McAfee’s annual Focus Security Conference to see where this was going.  Symantec painted the town yellow in anticipation of wooing away McAfee’s…

  • IBM, Fujitsu Take Biometrics Up a Notch

    In a move that could help IBM partners more successfully sell comprehensive identity and access management solutions, IBM and Fujitsu Frontech North America announced a deal this week to integrate Fujitsu’s palm vein biometric technology into IBM’s enterprise single-sign-on solution. Far more accurate and less prone to false negatives and false positives than fingerprint biometrics,…

  • VSAs to Crush Security Appliances

    As the virtualization market continues to mushroom, security is taking on a bigger role, with the virtualized security appliance (VSA) set to ‘deliver a strong left hook to traditional security appliances’, according to a new report from IDC. The research company says 72.4 percent of respondents are currently allocating funding for VSAs in their budgets…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.