Type your search and hit enter

firewalls - News, Features, and Slideshows

News

  • Experts weigh in on cyber war report

    Until recently, "cyber war" has been reserved for science fiction thrillers -- like something you might expect from William Gibson. In the past few years, though, the concept has been gaining more mainstream acceptance as a real possibility, but a recent report shoots that theory down, claiming "It is unlikely that there will ever be a true cyber war."

    Written by Tony Bradley20 Jan. 11 01:29
  • McDonald's customer data compromised through contractor

    McDonald's is warning customers to be on guard against identity theft, phishing attacks, or other scams thanks to a data breach. What makes the data compromise more concerning is that it is indicative of a growing hacker strategy to go for the low-hanging fruit rather than staging a direct attack.

    Written by Tony Bradley14 Dec. 10 01:53
  • WikiLeaks: Don't shoot the messenger

    With all of the hype and furor over WikiLeaks exposing sensitive government documents, it is easy to jump to the conclusion that WikiLeaks is bad, and is obviously doing something wrong. The reality, though, is that WikiLeaks is just a symptom, not the cause of the problem, and that silencing WikiLeaks is not really a solution.

    Written by Tony Bradley08 Dec. 10 08:31
  • Operation payback: WikiLeaks avenged by hacktivists

    WikiLeaks has been experiencing some issues lately ranging from having its Web hosting services shutdown to having its accounts frozen and the flow of money cut off. Some cheer those actions, while others see them as an attack on liberty and free speech and are coming to WikiLeaks' defense.

    Written by Tony Bradley08 Dec. 10 02:46
  • Prevent your data from becoming the next WikiLeaks headline

    WikiLeaks is making as many waves as it is headlines these days -- challenging the balance between the right to free speech and the need to defend national security interests. In a recent Forbes interview Julian Assange, founder of WikiLeaks, revealed that the site is expanding beyond government intelligence to begin unveiling corporate secrets as well.

    Written by Tony Bradley03 Dec. 10 02:27
  • Trend Micro purchase boosts data protection

    Trend Micro announced that it has signed a definitive agreement to acquire Mobile Armor -- a company that specializes in endpoint data protection. The move strengthens Trend Micro's data protection capabilities and positions it to address the growing concern of securing data on mobile devices that are easily lost or stolen.

    Written by Tony Bradley30 Nov. 10 04:05
  • Google takes Office to the Cloud, security issues remain

    Google has begun testing an intriguing plugin for Microsoft Office. Google Cloud Connect is a devastatingly simple concept: rather than save your files to your computer's hard disk, it allows you to save them to your online Google Docs space.

    Written by Keir Thomas24 Nov. 10 05:09
  • McAfee reports malware at all-time high

    McAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is valuable for IT admins -- enabling them to keep a finger on the pulse of malware, and to stay in touch with emerging attack techniques and trends.

    Written by Tony Bradley18 Nov. 10 02:56
  • Admin passwords are the achilles heel of security

    Passwords are the predominant means of securing sensitive data, and that is why there are established best practices defining password policies. Sadly, though -- the most critical data is often less secure because Admin passwords function outside of those policies and are rarely changed or updated.

    Written by Tony Bradley18 Nov. 10 06:36
  • Cisco SA 520 firewall disappoints

    There are two ways to look at the Cisco SA 520 network security appliance. On one hand, it offers a solid array of features: 65Mbps IPSec VPN throughput, 100Mbps overall throughput, integrated firewall (limited to 100 rules), built-in filtering for common services like IM and P2P networking, SSL VPN, IPS, DDNS, and multi-WAN support. On the other hand, it has nearly no relation to the rest of Cisco's security solutions.

    Written by Paul Venezia10 Nov. 10 03:28
[]