The Jericho Forum, a group created in 2004 by IT security managers convinced that firewalls and other perimeter gateways had become a hindrance to e-commerce, made quite a splash with its rallying cry of "de-perimeterization."
Stories by Ellen Messmer
With McAfee buying data-loss-prevention vendor Reconnex for US$46 million in cash, the question now is how will McAfee move forward in the future to bring the Reconnex product suite into its portfolio, especially with the overlap in DLP products between the two?
The Black Hat conference and its post-event, DefCon, promise to be a security funhouse in the coming week, as experts in Las Vegas seek to shock and amaze by poking holes in today's network technologies. The Web, wireless LANs, routers and desktop software may all look different reflected in the Black Hat/DefCon hall of mirrors, where security vendors will be revealing their hacker sides.
IBM and Websense are separately issuing their semiannual security trend reports this week, and the picture isn't pretty for Web sites, open source software and social networking programs.
Allowing employees to work from home and telecommute poses security and privacy risks that are not being addressed adequately by business or government, according to a study released Tuesday by consulting firm Ernst & Young in partnership with the Washington-based advocacy group Center for Democracy and Technology.
Open source software is a significant security risk for corporations that use it because in many cases, the open source community fails to adhere to minimal security best practices, according a study released Monday.
Rootkits are software code designed to hide from detection. So Kaspersky Lab's hunt for the elusive Rustock.C rootkit, rumored to exist for almost two years, reads like a detective plot.
The unfolding cliffhanger in San Francisco this week -- in which a city network administrator has been arrested for allegedly holding the network hostage -- represents an extreme example of the insider threat that IT security vendors and others have been sounding the alarm about for years.
For Tracy Mooney, a married mother of three in the US, the decision to abandon cyber-sense and invite e-mail spam into her life for a month by participating in a McAfee experiment was a bit of a lark.
With a goal of getting IT professionals to use standard terminology and eliminate ambiguity in expressing important risk-management concepts, the Open Group is finalizing a 50-page compendium of "risk-management and analysis taxonomy."
The Gpcode.ak virus, which encrypts files on the victim's desktop and demands a ransom to decrypt them, uses encryption that so far has proven too strong to crack. But Kaspersky Lab, which first identified Gpcode.ak earlier this month, says there is a way for most victims to at least recover their files.
Wall Street firms increasingly are buying into Linux, but some still need convincing that open source licensing and support models won't make using the technology more trouble than its worth.
Symantec Wednesday said a new version of its compliance-process automation software to ship next fall will add a way to identify data assets by accepting feeds through third-party asset-management systems.
The emergence of a variant on a virus that encrypts the victim's data with a strong 1,024-bit algorithm so the victim can't unscramble it without paying a ransom has begun to spread, potentially posing a major threat, according to the antimalware firm which discovered it.
Security issues often seem to smolder more than burn, but these six are certainly capable of lighting a fire under IT professionals at a moment's notice. Handle with care.