Oklahoma data centers are ready for tornadoes
The threat of tornadoes in Oklahoma is real, but the data centers in that state are ready. Insider (registration required)
Patrick Thibodeau | 17 Jun | Read more
The threat of tornadoes in Oklahoma is real, but the data centers in that state are ready. Insider (registration required)
Patrick Thibodeau | 17 Jun | Read more
A small team of ex-Symantec security experts has formed a stealthy Silicon Valley start-up called CirroScope that's focused on shielding enterprises from threats stemming from their use of SaaS applications such Box, Salesforce.com and Google Apps.
The network at one of the biggest annual networking shows is being subject to a series of distributed denial of service attacks (DDoS) creating the equivalent of 90 million sessions attempting to use the network at the same time, all as part of a controlled test of the Interop network.
Brandon Butler | 08 May | Read more
Running a small business isn't easy. I know. I run one. As a freelance writer, I’ve learned that you need to run your writing career as if you were running a business.
Jeff Vance | 29 Apr | Read more
Imperva used this week’s Infosecurity Show in London to announce what it believes is a key innovation for its line of web application firewalls – crowd-sourced threat data.
John E Dunn | 27 Apr | Read more
March’s huge DDoS attack on Spamhaus that left service providers struggling to contain a 300Gb/s DNS reflection surge was made possible by the industry's tardiness in implementing IETF recommendations on limiting forged traffic made more than a decade ago, EU security agency ENISA has argued.
John E Dunn | 16 Apr | Read more
To hear founder and CEO Joel Bomgar tell it, he might never have started his eponymous company if he'd had a cooler car.
Demand for information security experts in the United States is outstripping the available supply by a widening margin, according to a pair of recently-released reports.
Jaikumar Vijayan | 07 Mar | Read more
Vancouver police are investigating a brazen robbery at an Apple Store n which three male suspects allegedly sprayed 40 people with a chemical mix designed to ward off bears as they swiped an undetermined amount of Apple laptops, iPads and iPods.
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week.
Jaikumar Vijayan | 01 Mar | Read more
A big theme at the RSA Conference this year is a concept known as Big Data Security -- the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insiders and stealthy attacks aimed at stealing sensitive data.
Ellen Messmer | 27 Feb | Read more
Social networking, file sharing and video applications are not the major security risk many admins believe them to be despite living up to their reputation as major bandwidth hogs, firewall firm Palo Alto has discovered.
John E Dunn | 25 Feb | Read more
Large organisations are struggling to manage trust assets such as encryption keys and digital certificates in a muddle that could open many to the risk of cyberattack, a Ponemon survey for security management firm Venafi has concluded.
John E Dunn | 21 Feb | Read more
Advanced Persistent Threats (APTs) could be more of a mainstream security problem than previously thought after a survey of high-level security professionals found that an alarming one in five worked for a firm that had experienced such an attack.
John E Dunn | 17 Feb | Read more
More than six out of ten organisations hit by data breaches take longer than three months to notice what has happened with a few not uncovering attacks for years, a comprehensive analysis of global incidents by security firm Trustwave has found.
John E Dunn | 13 Feb | Read more