Security

Recent Articles

  • Firewalls and Firewall Management: Here to Stay

    Contrary to some security experts’ proclamations over the past few years, the demise of the corporate firewall has been seriously oversold.  While depending on the firewall and antivirus (AV) alone would be considered foolish in today’s time of sophisticated cyberattacks designed to elude these signature- and rule-based blacklist technologies, the truth is that the firewall…

  • Blackberry PlayBook Tablet Security Flaw Uncovered

    Research in Motion (RIM), the company behind Blackberry smartphones and the struggling PlayBook tablet, faces a new security threat after Ben Nell a consultant with the Intrepidus Group, and colleague Zach Lanier, a principal consultant with Intrepidus, announced the flaw during the Infiltrate Security Conference in Miami this week. The security flaw allows hackers to…

  • Microsoft Prepping Real-Time Botnet Threat Intelligence System

    NEW YORK — Microsoft is planning to make the data it collected as part of its botnet takedown operations available as a real-time threat intelligence feed. The company would distribute threat data obtained from captured botnets and other sources to foreign governments, law enforcement, Computer Emergency Response Teams and private corporations, two members of the…

  • Ingencio, Voltage Team Up on Data Encryption Platform

    Voltage Security, a provider of data-centric encryption and key management and Ingenico, a provider of payment solutions announced they have partnered to help simplify end-to-end payment data protection at the point-of-sale. The move aligns Voltage data protection technology with Ingenico Telium series devices to combat card fraud and reduce the PCI card data environment for…

  • Symantec Confirms Hackers Stole Outdated Code, Downplays Impact

    Symantec has confirmed that a group of hackers has stolen source code to two Symantec products, but downplayed the possible impact on users as a result of the theft. The attackers stole source code for two older Symantec products for enterprise customers, and not on the consumer-focused Norton product line as had been previously reported,…

  • 1. Apple iPad 2

    1. Apple iPad 2 The iPad 2 is easily one of the most desired enterprise products on the market right now. The only trouble is, few companies allow it, due to concerns over productivity and security. 2. Apple iPhone 4S Apple’s iPhone 4S is another one of those devices that’s ideal for consumers, but not…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.