Recent Articles
-
McAfee Says Spammers Could Teach Marketers a Thing or Two
In its’ latest spam report, McAfee Inc. says corporate marketing departments could learn a thing or two on how to better target customers. And governments around the world could improve their national and international business prospects by aggressively combating illegal Internet activities, but don’t hold your breath. Spammers understand their "customers," regardless of the country…
-
Could DLP Have Saved Goldman Sachs from a Big Headache?
Could data loss prevention technologies have prevented Sergey Aleynikov from allegedly stealing proprietary software from his former employer, Goldman Sachs? Perhaps yes. Perhaps no. While Goldman Sachs was defying the death spiral engulfing other large banks and trading houses by posting a $3.4 billion third quarter profit, computer programmer Aleynikov allegedly transferred 32 gigabytes of…
-
SonicWall Launches Cloud-Based Anti-spam Service
Security appliance vendor SonicWall is wading into cloud computing with a new hybrid service that provides remotely delivered anti-spam and malicious content protection that’s integrated with its Generation 5 firewalls and unified threat management (UTM) devices. The SonicWALL Comprehensive Anti-Spam Service will be sold as an annual subscription-based service through authorized solution providers. Inspection of…
-
Microsoft Office Users Attacked by Cybercriminals
(Reuters) – Microsoft Corp warned that cybercriminals have attacked users of its Office software for Windows PCs, exploiting a programing flaw that the software giant has yet to repair. The world’s largest software maker issued the warning on Tuesday as it released patches to address nine other security holes in its software. "Despite today’s fixes,…
-
Rogue DBAs: Implementing Controls on Privileged Users
There are many reasons why enterprises are failing to hold database administrators (DBAs) accountable through monitoring and policy enforcement, but one of the big factors is historical inertia. “In every environment you have DBAs and sys admins and application developers and all those types of folks, who by nature of their privileged access have access…