Security

Recent Articles

  • Could DLP Have Saved Goldman Sachs from a Big Headache?

    Could data loss prevention technologies have prevented Sergey Aleynikov from allegedly stealing proprietary software from his former employer, Goldman Sachs? Perhaps yes. Perhaps no. While Goldman Sachs was defying the death spiral engulfing other large banks and trading houses by posting a $3.4 billion third quarter profit, computer programmer Aleynikov allegedly transferred 32 gigabytes of…

  • SonicWall Launches Cloud-Based Anti-spam Service

    Security appliance vendor SonicWall is wading into cloud computing with a new hybrid service that provides remotely delivered anti-spam and malicious content protection that’s integrated with its Generation 5 firewalls and unified threat management (UTM) devices. The SonicWALL Comprehensive Anti-Spam Service will be sold as an annual subscription-based service through authorized solution providers. Inspection of…

  • Microsoft Office Users Attacked by Cybercriminals

    (Reuters) – Microsoft Corp warned that cybercriminals have attacked users of its Office software for Windows PCs, exploiting a programing flaw that the software giant has yet to repair. The world’s largest software maker issued the warning on Tuesday as it released patches to address nine other security holes in its software. "Despite today’s fixes,…

  • Juniper Expands Capabilities of Adaptive Threat Management

    The networking vendor has been building out its Adaptive Threat Management solution since last summer when it made announcements around high-end routing and switching, but now it’s broadening the solution. While WAN acceleration capabilities have been available for some time, the new WAN acceleration capabilities in the Juniper product are focused around identity- and role-based…

  • Rogue DBAs: Implementing Controls on Privileged Users

    There are many reasons why enterprises are failing to hold database administrators (DBAs) accountable through monitoring and policy enforcement, but one of the big factors is historical inertia. “In every environment you have DBAs and sys admins and application developers and all those types of folks, who by nature of their privileged access have access…

  • Ingram Micro Pays $15M Fine for Channel Stuffing Scheme

    IT distributor Ingram Micro paid a hefty price for helping Network Associates (now McAfee) in an elaborate channel stuffing scheme over a period of two years that inflated Ingram Micro’s profit margins and McAfee’s revenues by hundreds of millions of dollars during the height of the dot-com boom. Ingram Micro has paid a $15 million…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.