Cisco: patch your data center switch manager software now
Information stored on SANs and LANs at risk from latest Cisco software flaw.
Information stored on SANs and LANs at risk from latest Cisco software flaw.
Who run so-called ‘booter’ services that are used to knock out websites and are sometimes used for extortion? Young males. Why? Easy money.
Most of the time, the world of science is dry for very good reasons. The rigor of the scientific process demands extensive observation, experimentation and documentation of every minor facet of every minor phenomenon in nature – with the result that you get a lot of studies that cover only a single aspect of specific protein denaturing under a specific set of circumstances, or some such.
Ferguson, Mo., the city now in the midst of protests over a fatal police shooting, runs the type of IT department that gets almost no attention.
Patrick Thibodeau | 15 Aug | Read more
There's no scientific formula behind this list: It's just a bunch of new-ish, mainly enterprise-focused computing and networking companies that have launched, received fresh funding of late or otherwise popped onto my radar screen.
VMware today put forward its "vision" for unifying the mobile security and management technology it acquired in its $1.5 billion acquisition of AirWatch earlier this year with its traditional line of virtualization software.
Ellen Messmer | 01 May | Read more
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are.
Brandon Butler | 21 Apr | Read more
A study released today by the Pew Research Center shows that majorities in 22 of 24 developing nations surveyed want their access to the Internet to be free of government censorship, including 70%+ majorities in half of the countries that were included.
Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This roundtable discussion examines methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees.
Phil Cummings says network firewalls will continue to be a critical piece of Health Information Technology Services -- Nova Scotia security portfolio for one simple reason: nothing's come along to replace them.
Jaikumar Vijayan | 05 Mar | Read more
As pressure mounts to deliver value with ever-increasing speed, lines of business (LOB) are often drawn to cloud computing's ease of use, flexibility and rapid time-to-value. The resultant Shadow IT created by use of consumer grade cloud computing resources usually raises questions about enterprise security, but the real risk is the potential for downtime due to inadequate availability.
Dave LeClair, Senior Director of Strategy at Stratus Technologies | 30 Jan | Read more
Juniper today announced its Firefly Suite for virtual-machine security, a set of software-based products for VMware and KVM that contain the security and switching capabilities found in Juniper's SRX Series Services Gateway, as well as Junos Space Virtual Director.
Ellen Messmer | 16 Jan | Read more
InfoWorld's 2014 Technology of the Year Award winners recognize the best tools and technologies for developers, IT pros, and businesses
Peter Wayner | 15 Jan | Read more
Cloud-based services are still often seen as too risky for sensitive information. Take the case at Kingsport, Tenn.-based Eastman Chemical Company, which said "no" to the cloud when designing its new crisis communications system.
Ellen Messmer | 02 Jan | Read more
Network World tested hundreds of products in 2013, but here are our top 10 tests of the year. In order to make the list, the product review had to be a comparative test of multiple products in a single category and it had to break new ground or deliver fresh insight into an important product area.
Neal Weinberg | 11 Dec | Read more