Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from security consultancy ...
Tags: cloud provider, network, security consultancy, BAE System
Customers and end-users are having the wool pulled over their eyes by organisations that fail to report data breaches, according to Simon Bain, CTO of document management firm Simplexo. The EU information security agency Enisa recently ...
Tags: data breaches, arrogant firms, customers
Aruba Networks announced three new Wi-Fi controllers that have built-in controls to boost application delivery. The new Aruba 7200 Series controllers inspect data packets flowing through Wi-Fi networks and apply software tools that can ...
Tags: Aruba Networks, Wi-Fi controllers, Aruba 7200 Series controllers
Chairman and CEO, Netgear, talks about market competition and partner strategy in the India market. CW: Over the years, what has redefined the networking market, which was more about switches and routers? Lo: Presently, the network is ...
Tags: Netgear, India, market competition, partner strategy
Web users and people shopping online during the upcoming holiday season should watch out for a new crop of scams, some of them targeting users of mobile devices, cybersecurity vendor McAfee warned. Many of the scams in McAfee's 2012 ...
Tags: McAfee, holiday season, mobile devices, operating systems
The 2011 security breach at Dutch certificate authority(CA)DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration,according to Fox-IT,the ...
Tags: DigiNotar, Fox-IT, security breach, CA server
Cost pressures and the rise of cloud computing have led many businesses to turn to lower-cost virtual environments on premise and in the cloud, but a lack of expertise and experience may be exposing these organisations to unnecessary ...
Tags: cloud computing, virtual server, physical server, physical networks
After McAfee CTO Michael Fey yesterday pledged a multivendor future for the company as part of its dedication to stepping up real-time,global threat reporting in its software,Computing caught up with some partners and customers for their ...
Tags: McAfee, Tyco, McAfee FOCUS 2012, BYOD security products
IDG News Service-Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages,downloading and executing files,hijacking accounts,bypassing ...
Tags: malware, browser extension, remote-controlled, Balazs
Many companies are not taking into account modern technology and methods when approaching data security, said Cisco senior vice president of security and government, Chris Young, at a press roundtable in London today. Young labelled the ...
Tags: Chris Young, Cisco, Huawei, ZTE
Citrix Systems has released the latest version of its virtualisation platform XenServer.Version 6.1 features cloud integration capabilities and a storage feature called Storage XenMotion that will bring agility as it allows IT executives to ...
Tags: Citrix, Xenserver 6.1, Cloud, Cloud Platforms Group
Iran has blocked access to Google search and Gmail in a move officials say is aimed at improving cyber security. The Islamic Republic has increasingly tightened cyber security after its nuclear programme was targeted by the Stuxnet worm ...
Tags: Iran, Google search, cyber security, Facebook
Although U.S.manufacturers and distributors are increasingly optimistic about their own businesses,many are deeply troubled by domestic and global economic conditions.These are among the findings in a new report titled the The McGladrey ...
Cloud computing,IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security. Analyst Gartner has predicted context-aware security will be the preferred method for IT to evolve enterprise security to ...
Tags: predicted context-aware security, Cloud computing, IT consumerisation
When transitioning workloads to virtual environments, one of the big drawbacks for data center administrators can be a loss of visibility. When a problem occurs, it can be difficult to get a handle on details like which users are affected ...
Tags: Applications, Splunk, USA, computer industry