Quantcast
Channel: ARN - Stories by Ellen Messmer RSS feed
Browsing all 15 articles
Browse latest View live

IBM opening two state-of-the-art disaster recovery/resiliency centres

IBM is about to cut the ribbon officially opening two new state-of-the-art datacentres intended to provide disaster recovery and resiliency services, one in the Raleigh, N.C. area and other in Mumbai,...

View Article



Microsoft's strategy on identity management aimed squarely at cloud-based...

Microsoft's strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based...

View Article

Certificate Authority Security Council backs SSL server rules taking effect...

As a safety precaution to prevent SSL server certificates being exploited for network man-in-the-middle attacks on organizations, vendors that issue SSL server certificates will begin adhering to new...

View Article

Start-up offers up endpoint detection and response for behavior-based malware...

Start-up SentinelOne is offering security software for behavior-based malware detection intended to augment, not replace, the type of full anti-virus endpoint protection suites that typically also have...

View Article

Should companies practice data retention or data destruction?

Many businesses spend a lot of time thinking about how to retain and store data, but there's another idea: Think about how to destroy your data.

View Article


Most websites are "One Day Wonders" -- and that's worrisome

The Internet's seething Web of content resembles endless bubbles popping to the surface for only a day, then vanishing, a security study from Blue Coat Systems released today indicates. That means...

View Article

HyTrust, Intel team to lock down VMware virtual machines

HyTrust, in a partnership with Intel, today said its cloud security software used with VMware-based virtual machines can now ensure those VMs will only run in designated trusted locations based on...

View Article

Cleveland Indians turn to SIEM in malware, botnet battle

For the Cleveland Indians' IT department, dealing with malware on behalf of hundreds of Windows-using employees at the baseball team's Progressive Field data center operations can be a little bit like...

View Article


Can SDN usher in better IT security?

That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security...

View Article


NIST issues Best Practices on how to best use Secure Shell software

The Secure Shell (SSH) protocol and software suite is used by millions of system administrators to log into application and service accounts on remote servers using authentication methods that include...

View Article

Skyhigh Networks integrates cloud security for Box file-sharing with...

Skyhigh Networks Wednesday aired an offering that lets companies using the Box file-sharing service first have files checked for compliance by their existing data-loss prevention (DLP) equipment.

View Article

Google's plan for Chrome worries certificate authority vendors

Google intends to make changes in its Chrome browser later this year that would have Chrome display a warning on websites using certificates based on the secure hash algorithm, SHA-1. Google wants to...

View Article

HP showcases security software that look to detect infected and compromised...

At its HP Protect Conference in Washington, D.C. this week, HP is taking the wraps off new security products that aim to detect infected and compromised machines as well as server-based software that...

View Article


Ernst & Young accused by Canadian used computer dealer of data breach

A used computer dealer in Canada claims he discovered a trove of Ernst & Young customer business data on Dell servers bought back in 2006 -- and he wants the global consultancy to pay him to return...

View Article

12 "White Hat" hackers you should know

These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up — as they try to stay one step ahead of their underground "Black Hat" cousins…

View Article

Browsing all 15 articles
Browse latest View live




Latest Images