Techworld

Security

Cloud computing causing rethinking of disaster recovery

Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.

By John Dix | 31 July, 2013 00:42

Tags: network storage, Configuration / maintenance, Cloud, security, IBM, hardware systems, internet, cloud computing, Data Center

10 questions for Ping Identity CTO Patrick Harding

Name: Patrick Harding

10 questions for Layer 7 Technologies CTO Scott Morrison

Name: Scott Morrison

10 questions for Fiberlink CFO Mark Partin

Name: Mark Partin

10 questions for Recall Senior VP and CFO Allison Aden

Name: Allison Aden

Intel/McAfee: What's the future of security?

Intel completed its multibillion-dollar acquisition of McAfee almost a year and a half ago, and this week McAfee co-President Mike DeCesare spoke with Network World senior editor Ellen Messmer about what the merger of Intel's chip-making capabilities and McAfee's security expertise is expected to bring down the road.

10 questions for Gehry Technologies CFO Michael Lin

Name: Michael Lin

10 questions for Hortonworks CTO Eric Baldeschwieler

Name: Eric Baldeschwieler

Red Hat CEO Jim Whitehurst weighs in on strategy, Oracle and growth

Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.

10 questions for Agencyport Software CFO Rick Gilbody

Name: Rick Gilbody

10 questions for ownCloud CFO Dan Curtis

Name: Dan Curtis

10 questions for The Children's Center CFO Michael Miligan

Name: Michael Milligan

10 questions for Bit9 CTO Harry Sverdlove

Name: Harry Sverdlove

10 questions for Cormant CFO Catherine Goodison

Name: Catherine Goodison

10 questions for Imperva CTO Amichai Shulman

Name: Amichai Shulman

Open source identity: Bitcoin technical lead Gavin Andresen

Originally from Melbourne, Australia but now living in the US, Gavin Andresen is the technical lead of the Bitcoin virtual currency system. Started by Satoshi Nakamoto in 2009, Bitcoin is a digital currency system consisting of an open source client and P2P network. The aim of the Bitcoin project is a decentralised, secure peer-to-peer currency system that does not rely on banks or central transaction processing authorities. To generate “Bitcoins” people on the network use a cross-platform, open source client developed in C++. In addition to the open source aspect of Bitcoin, there is now an emerging market in services around the cryptocurrency such as exchange portals and virtual clearing houses. Previously, the Open Source Identity series has featured interviews with Ruby on Rails creator David Heinemeier Hansson, Linux’s Linus Torvalds, Jan Schneider of Horde, Mark Spencer of Asterisk fame, Spine CMS creator Hendrick van Belleghem, Free Telephony Project founder David Rowe, and PulseAudio creator Lennart Poettering. This time we talk to Gavin Andresen about the new, decentralised approach to money – Bitcoin.

By Rodney Gedda | 21 March, 2011 14:29

Tags: open source, e-commerce, money, encryption, currency, open source identity, Gavin Andresen, Bitcoin, P2P, internet banking

Estonia readies for the next cyberattack

More than anyone else, Jaak Aaviksoo has first-hand knowledge of what a cyberwar might feel like. In April 2007, Estonia's banking, media and government presence online was disrupted by several waves of distributed denial of service attacks that knocked services offline. The country is heavily wired -- 90 percent of all financial transactions are conducted over the Internet and 70 percent of the population files their tax returns electronically -- so the incident was widely felt by the country's 1.3 million citizens.

By Robert McMillan | 08 April, 2010 06:49

Tags: cyberattacks, estonia, security

SaaS, not shopping, is focus of Symantec's new CEO

CIOs think of Symantec as a company that buys its way into new markets. Over the past decade the Cupertino, California, vendor has snatched up about 30 companies as it's evolved from an antivirus and tools seller to an aspiring enterprise infrastructure vendor.

By Robert McMillan | 26 June, 2009 09:32

Tags: mergers & acquistions, SaaS, symantec, security, CEOs

Five Ways To Survive a Data Breach Investigation

Security experts say it all the time: If a company thinks it has suffered a data security breach, the key to getting at the truth unscathed is to have a response plan in place for what needs to be done and who needs to be in charge of certain tasks. And, as SANS Institute instructor Lenny Zeltser advised in CSOonline's recent How to Respond to an Unexpected IT Security Incident article, "ask lots and lots of questions" before making rash decisions.

By Bill Brenner | 16 April, 2009 09:11

Tags: security, investigation, data breach

McAfee looks to security in virtual environments

McAfee is hunkering down to integrate the security technologies it has bought over the past several months into its varied line of security software and appliances. Two trends in the company's activities are developing parallel products for deployment as software on endpoints and as network-based appliances. This week, for instance, the company is announcing that NAC software can be installed on its IntruShield IPS appliance to give customers the option of enforcing NAC policies in the network, not just on the endpoint. The company is bringing management of these platforms under control of its ePolicy Orchestrator (ePO) in an effort to centralize control of network security. Network World Senior Editor Tim Greene spoke with McAfee CEO Dave DeWalt about these efforts as well as other issues facing the company.

By Tim Greene | 21 October, 2008 10:36

Tags: security, virtualisation

Top Whitepapers

Twitter Feed

Featured Whitepapers