WatchGuard Technologies has announced today that it is the first UTM security appliance vendor to offer a firewall that configures itself. The company is adding a new cloud-based configuration utility – RapidDeploy – that ...
Tags: WatchGuard, security appliance, WatchGuard devices, network security
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from security consultancy ...
Tags: cloud provider, network, security consultancy, BAE System
The Oracle OpenWorld Conference 2012 opened today at the Moscone Exhibition Centre, San Francisco. The five day affair began today with a keynote from CEO Larry Ellison who began by thanking the company’s 390,000 customers across the ...
Tags: Oracle OpenWorld Conference, keynote, ICT, cloud strategy
Investment bank Investec sees social media as part of the insider threat to information security, but has implemented policies and technologies to make it work. “Staff members are probably one of the biggest threats,” David ...
IDG News Service-Microsoft launched a new anti-piracy campaign in China to highlight the security risks of buying counterfeit software. In a recent investigation,Microsoft purchased 169 PCs from shops in China and found that all were ...
Tags: software, Microsoft, software market, Business Software Alliance
Wi-Fi offloading helps network operators cope with rapidly increasing data traffic from mobile devices,writes Adrian Schumacher from Rohde&Schwarz. Smart devices make it convenient to access the Internet from virtually anywhere because ...
Tags: Wi-Fi, smart devices.MNOs, ANDSF
The International Telecommunications Union(ITU),which has unilaterally"assumed"control of the governance of the internet,has agreed in sessions held behind closed doors on a new standard covering deep-packet inspection. Further reading ...
Roche has entered into a collaboration agreement to integrate Elsevier's Reaxys workflow solution into its propriety reaction information to improve productivity and benefit from increased discoverability of in-house chemistry content as ...
Tags: Roche, Reaxys workflow solution, integrated chemistry data
Networking hardware giant Cisco is to acquire privately held Meraki for $1.2bn (GBP 755m). Meraki, which was founded in 2006 and has offices in New York, London and Mexico, offers mid-market customers easy-to-deploy on-premise networking ...
Tags: New York, London, easy-to-deploy
A German couple are not liable for the filesharing activities of their 13-year old son because they told him unauthorized downloading and sharing of copyrighted material was illegal,and they were unaware the boy violated this ...
Hackers of the world,unite!You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones,routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer ...
Tags: DD-WRT, Vyatta, security, Hackers, routers, Tomato, OpenWRT, M0n0wall, PfSense
Globally,almost half(46%)of enterprise information is being stored outside of its own datacentre,with 23%stored on the cloud as mobile computing and cloud services go mainstream,according to the State of Information Report 2012 from ...
Tags: Symantec, enterprise data, datacentre, mobile devices, cloud
The number of consumer smartphone and tablets brought into workplaces will more than double by 2014, according to a recent study, but security on the endpoints is lacking. Juniper Research claims the number of devices being used in the ...
Tags: BYOD devices, smartphone, tablets, mobile devices
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft,data theft,snooping,impersonation and malware infection.That's why so many people rely on public virtual private network services,but VPNs are no ...
Tags: Computer, VPN, public Wi-Fi hotspot, security
The 2011 security breach at Dutch certificate authority(CA)DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration,according to Fox-IT,the ...
Tags: DigiNotar, Fox-IT, security breach, CA server