OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
BlackBerry Wraps Enterprise Security Blanket Around iOS, Android
June 26, 2013
If you own an iPhone or Android mobile phone and work at a BlackBerry shop, it will be simpler from now on to keep your personal information and apps segregated from those you use for work. That's thanks to BlackBerry's Tuesday release of Secure Work Space, an iOS and Android solution that gives handsets running those operating systems capabilities previously reserved only for BlackBerry hardware.
Criticism: A Security Chief's Most Valuable Resource
May 17, 2013
This past week, a lesson about enterprise information security found its way to me via a somewhat unorthodox channel: specifically, an episode of Gordon Ramsay's Kitchen Nightmares. In this particular episode, the upshot was that Ramsay wasn't able to help. Why not? The owners weren't able to take criticism. There's a lesson in this for those of us in the network and security space.
Cisco's Data Center Sales Spark Q1 Earnings
May 16, 2013
Cisco's quarterly earnings report beat Wall Street expectations this week, giving investors a hint of confidence in the constantly evolving tech industry. The networking company reported a net income of $2.48 billion, or 46 cents per share. That's up from the $2.17 billion it earned during the same time last year. Revenue was up 5.4 percent to $12.22 billion.
Millions of Livingsocial Users Now Prime Phishing Targets
April 29, 2013
LivingSocial's customers received some bad news on Friday: The popular daily deal site had been hacked, compromising some 50 million members' customer data. There was some good news -- credit card data was not affected, the company promised in its notice to customers. Also, the Facebook credentials of users who connected to LivingSocial using Facebook Connect were not compromised.
Android: A Second Career in Security?
April 23, 2013
Many of us have a wealth of decommissioned corporate-provisioned mobile devices: We've bought them, handed them out, and seen them used successfully for years. Now they're on their way to the great docking station in the sky. However, because these devices are already off the books adapting them for specific security functions can mean achieving certain goals practically for free.
Provo Is Next Stop on the Google Fiber Express
April 20, 2013
One week after the announcement that the Google Fiber network would come to Austin, Texas, Provo found out it will be the third city to get the search company's gigabit high-speed service. The Utah city, home to a much-criticized, money-losing fiber optic network, will sell it to Google for $1. The announcement means the company will eventually provide the city with Internet service that is 100 times faster.
Dutch Spam Fight Boils Over Into Largest-Ever DDoS Attack
March 27, 2013
A week-old squabble between two Dutch groups -- the spamfighting Spamhaus Project and Web hosting service Cyberbunker -- has resulted in what has been called the largest distributed denial of service attack in Web history. The cyberfight reportedly has spilled over onto the global Internet and slowed down some data communications, especially in Europe.
FCC Buckles on Cybersecurity
March 20, 2013
Internet service providers are resisting the Federal Communications Commission's recommendations for implementing security best practices, the agency has reported. The ISP members of the Communications, Security, Reliability and Interoperability Council (CSRIC) say they believe additional evaluation is required to determine whether those best practices should apply to their industry.
RIM Releases BYOD-Friendly IT Management Software
January 23, 2013
Research In Motion released a new version of its BlackBerry Enterprise Service mobile device management software on Wednesday. This comes just over a week before the official launch of the new BlackBerry 10 OS and compatible handsets, and just days after RIM CEO Thorsten Heins suggested the company might abandon the hardware market and sharpen its focus on software.
Akamai to Bring Smoother Video, App Performance to AT&T Network
December 07, 2012
Akamai is joining forces with AT&T to help the telecom carrier better deliver Web and entertainment content to mobile consumers. The two will team up over the next year, with AT&T folding much of Akamai's content delivery platform into its IP network. The system will be jointly marketed, managed and supported. The consolidation will allow AT&T to offer improved content delivery network services to its business customers.
Secure User Authentication: Might Makes Right
October 13, 2012
While the benefits of adopting Bring Your Own Device as your mobile policy are appealing -- from increased productivity to lower costs -- a BYOD policy can also leave your corporate network more vulnerable than ever. The breaches regularly featured in the news remind us that all networks, no matter how large or small, risk being exposed to unauthorized users every day.
Mobile Security: A Moving Target
October 02, 2012
The threat to enterprise security is increasing as the BYOD phenomenon gains ground in corporate America. The amount of Android malware out there has gone through the roof, and hackers are leveraging Twitter to create command and control servers for mobile botnets, according to McAfee's Q2, 2012 threats report. Existing approaches to security don't work well, and new solutions are required.
How Secure Is the Cloud, Really?
August 28, 2012
Cloud security skeptics were given yet another reason to doubt the fortitude of online storage when the strange tale of Mat Honan emerged earlier this month. Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life.
DeepField Maps the Intricacies of the Cloud
July 31, 2012
The cloud -- as in, the offsite storage of data -- is becoming as vast and ever-changing as clouds in the sky, but DeepField Networks announced an analytics tool that could allow the flow of cloud-based data to be mapped. This would include tracking traffic patterns, application performance and cost structure of networks for cloud computing companies as well as content providers and carriers.
Memo to Twitter: Failure Is No Longer Amusing
July 27, 2012
Twitter is back in action after a data center failure caused worldwide outages for many of its users Thursday. Starting around 8:30 a.m. PT, Twitter users who tried to access the site were greeted with a partially coded message that read, "Twitter is currently down."
A New Day for ID Management
July 23, 2012
Let's examine the relationship between controlled digital identities in cyber risk management. Our panel will explore how the technical and legal support of ID management best practices have been advancing rapidly. And we'll see how individuals and organizations can better protect themselves through better understanding and managing of their online identities.
Making IT Problems Solve Themselves
July 09, 2012
IT must do whatever it takes to make businesses lean, agile and intelligent. Modern support services, then, also need to be able to empower workers and IT personnel to maintain peak control of systems and to keep the applications, data and processes performing reliably at lowest cost.
Now You See It, Now You Don't: The Challenges of a Disappearing Network Perimeter
July 06, 2012
It may seem like Houdini is inside the network, because the perimeter as we have known it is disappearing. Conceptually, firewalls used to sit between the public Internet and the internal network with its servers, desktops and applications. There was a clear network perimeter separating internal resources from the outside world.
Twitter's Not Singing About Outage Details
June 22, 2012
Twitter was unavailable to users for significant portions of the day on Thursday. Contrary to speculation, it wasn't due to a hack attack, despite attempts by some groups to claim responsibility. Rather, a "cascading bug" in one of its infrastructure components was the cause for the upheaval, Twitter said.
Process Maturity and the Fine Art of Control
June 19, 2012
If you're in IT and your job involves securing your organizations' infrastructure, you've probably spent a good deal of time thinking through control selection -- in other words, picking the controls that most directly help you accomplish the goal of securing your environment.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS