Wide Area Network - News, Features, and Slideshows

News

  • Gartner: Start security monitoring in the public Cloud

    Security monitoring -- the type involving traditional security information and event management (SIEM) -- can be done in some public Cloud environments, according to Gartner. And if you're using public Cloud services, it's time to think about doing it.

    Written by Ellen Messmer12 June 13 20:40
  • Bitcoin isn't PRISM-proof

    In the aftermath of the revelation of PRISM, the NSA spying program that collects user data from nine major U.S. tech companies, many have highlighted alternate options from organizations that are not known to be cooperating with government surveillance efforts.

    Written by Colin Neagle12 June 13 20:40
  • Gartner: 7 major trends forcing IT security pros to change

    Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner.

    Written by Ellen Messmer10 June 13 22:18
  • Oops. Microsoft takes down some researchers' servers along with Citadel botnet sites

    When Microsoft took down Citadel botnets last week it disrupted the thieves who use the malware for stealing online banking information, but it also caused collateral damage by knocking out sinkhole servers used by researchers to figure out how best to combat the criminals, a Swiss researcher says.

    Written by Tim Greene10 June 13 20:13
  • Debate rages over revelation of NSA spying secrets

    Debate continues to rage today over the bombshell revelations that the National Security Agency collects intelligence on individuals via telecommunications and social-networking sites. The uproar has the U.S. government and private companies admitting to some aspects of the surveillance, while vehemently denying others. A former CIA agent working for Booz Allen Hamilton has revealed himself as the leaker.

    Written by Ellen Messmer10 June 13 14:25
  • Why password-only authentication is passe

    The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.

    Written by Bob Violino10 June 13 13:56
  • Google flatly denies involvement in PRISM snooping program

    Google CEO Larry Page strongly denied on Friday that Google allowed the U.S. government back door access to its data centers via a controversial snooping program revealed this week called PRISM.

    Written by Bob Brown07 June 13 23:12
  • Panelists decry lax security in medical devices

    Security for medical equipment such as MRI machines to and pacemakers is woeful, even though these devices today connect to networks and sometimes face risks from malware or hacking, according to a panel of university researchers speaking at this week's Design Automation Conference.

    Written by Ellen Messmer05 June 13 16:15
  • Gartner security survey: McAfee up, Trend Micro down

    A Gartner report about the security software market shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot with 19.6 per cent of the $US19.1 billion market.

    Written by Ellen Messmer30 May 13 18:37
  • Smartphones take center stage in two-factor authentication schemes

    We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.

    Written by David Strom20 May 13 14:30
  • Why don't risk management programs work?

    When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network World Editor in Chief John Dix asked two of the experts on that panel to hash out in an email exchange why these programs don't tend to work.

    Written by John Dix20 May 13 06:20
  • SunGard brings cloud service to disaster recovery

    Can the old guard in business continuity and disaster-recovery services thrive in an era when the companies are looking at new ways to process business data? SunGard Data Systems, with decades of experience in availability services, is feeling the pinch as some business clientele move data to the cloud. But SunGard says it's pushing forward with innovations that are making it a public cloud provider as well with the kind of application availability it says will be hard to match elsewhere.

    Written by Ellen Messmer15 May 13 21:57
[]