Do smaller businesses think they're immune to security threats?
Do small to midsize businesses (SMB) think they're somehow immune to <a href="http://www.networkworld.com/topics/security.html">security</a> threats?
Do small to midsize businesses (SMB) think they're somehow immune to <a href="http://www.networkworld.com/topics/security.html">security</a> threats?
CA Technologies has gotten its feet wet with Cloud-based security before, but now the company is moving further in with a package of Cloud-based identity and access control services.
Is there justice in cyberspace? The U.S. Department of Justice (DOJ) last week offered hope there is, <a href="http://www.networkworld.com/news/2011/110911-doj-charges-seven-in-massive-252945.html">charging seven individuals</a> with 27 counts of wire fraud and other computer-related crimes in connection with a massive "clickfraud" scheme that was based in Estonia.
Forrester Research this week published a report that <a href="http://www.networkworld.com/news/2011/110911-banks-hacker-raids-252944.html">advises security professionals</a> not to jump the gun on fixing security deficiencies immediately after a <a href="http://www.networkworld.com/community/tech-debate-data-breach">data breach</a> is identified since that could destroy valuable evidence needed to prosecute cyber-criminals.
Gartner is predicting that corporate spending across the world for a broad swath of security services will climb from about $US35 billion today to $US49 billion in three years, with the managed security services expected to jump most of all.
The <a href="http://www.networkworld.com/topics/3g-4g.html">4G</a> cellular technology manufacturer Lemko Corp. yesterday sued Motorola Solutions and its lawyers, saying Motorola's claims that Lemko is allegedly part of a Chinese spy ring tied to the Chinese government and Chinese companies have unfairly damaged its business.
Software engineer Hanjuan Jin, <a href="http://www.networkworld.com/news/2009/031909-high-tech-spy-case-trial.html">accused of stealing</a> thousands of confidential and proprietary technical documents from Motorola to share with competitors and the People's Republic of China, is expected to stand trial this week in Chicago.
Ever been in an argumentative mood? Well, last week we were, with editors here coming up with 33 red-hot arguments, such as open source vs. proprietary, or which browser is better.
If an employee walked into work one day clutching his shiny new iPhone, <a href="http://www.networkworld.com/news/2010/111910-apple-ipad-resources.html">iPad</a>, Android or other mobile smartphone or tablet, wanting to use it for official corporate business, would you say yes?
Cisco today announced a former VMware executive will head up the newly formed Cisco Security Group at Cisco, which combines two formerly separate units into one security-focused group.
Heightened awareness about stealthy network attacks designed to steal sensitive information -- what some call the "<a href="http://www.networkworld.com/news/2011/020111-advanced-persistent-threat.html">advanced persistent threat</a>" -- is having an impact in raising <a href="http://www.networkworld.com/topics/security.html">security</a> budgets and increasing executive management involvement in information technology, according to a survey published today.
In last week's news, Amazon Web Services vulnerabilities <a href="http://www.networkworld.com/news/2011/102611-security-cloud-252406.html">were found and fixed</a>, but other cloud service providers are probably susceptible to similar problems <a href="http://www.networkworld.com/news/2011/102611-researchers-demo-cloud-security-issue-252403.html">discovered by a German research team</a> at Ruhr University Bochum.
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic based on what's called "Suite B," the set of encryption algorithms designated by the National Security Agency for Department of Defense communications.
China was slammed on several fronts in a barrage of articles published today in the U.S. media that touched on <a href="http://www.networkworld.com/topics/security.html">security</a> concerns related to the U.S. and Iran, plus a crackdown on Internet usage said to be unfolding within China.
IBM intends to make the security information and event management (SIEM) technology gained through the acquisition of Q1 Labs, which was officially closed yesterday, the centerpiece of IBM's broad security product portfolio.