Security News, Features, and Interviews

News
Round Table
  • Roundtable: Security Guide for the Cloud - right here, right now

    By Jennifer O'Brien | 07 June, 2011 15:15

    The cloud 'security strategy' involves adopting security solutions that seamlessly span physical, virtual and private/hybrid/public cloud environments while simplifying operational and management complexities. Roundtable attendees got down to business, discussion the 'practical steps' and issues and opportunities involved in securing the cloud environment. Jennifer O'Brien reports.

  • Selling security to SMBs

    By Nadia Cameron | 02 July, 2009 10:40

    ARN pulled together a panel of industry representatives to discuss how to position security solutions successfully to 5-499 seat organisations in today’s economic climate. This roundtable was held in conjunction with Symantec.

  • The future of IT security

    By ARN Staff | 07 May, 2008 12:05

    The ARN round table was held in conjunction with Firewall Systems and its vendor partners, AirMagnet, Blue Coat, Check Point, Network Box, TippingPoint and WatchGuard.

Features
Interviews
Opinions
  • Discovering a blind eye to vulnerabilities

    By By J.F. Rice | 13 April, 2015 23:47

    Last week, I was horrified to discover a problem with my vulnerability scanner. The product I use relies on a user account to connect to our Microsoft Windows servers and workstations to check them for vulnerable versions of software, and that user account had never been configured properly. As a result, the scanner has been blind to a lot of vulnerabilities. And this has been going on for a long time.

  • With greater visibility comes increased response

    By By Mathias Thurman | 09 April, 2015 23:51

    I mentioned in a previous article that we are using a "loaner" Palo Alto Networks firewall, with all the bells and whistles. Our testing led to all sorts of interesting discoveries, and I certainly hope that the executive staff will agree that the increased visibility makes this sort of new-generation firewall well worth the investment.

  • BYOD and Cloud are top data breaches and malware risks, survey shows

    By By Elden Nelson | 07 April, 2015 04:07

    With the influx of personal devices in the workplace and the unprecedented risk of data breach and malware, tightening IT security at a company can seem like a daunting task. Just how difficult of a task is it? What are the biggest security risks and what are the top minds in IT considering to combat them?

  • The signs of spring: Birds, flowers and new tech

    By Barbara Krasnoff | 27 March, 2015 05:01

    Back in the dark ages, when the only way to get onscreen entertainment was by tuning in a television set at a specific time (get home late? miss your favorite show? too bad for you!), networks had a habit of scheduling similar shows opposite each other. The notion was presumably, that the competition would cause one show to win out over the other, which would eventually drop in the ratings and get cancelled. The idea that viewers might be interested in seeing both apparently was not in the networks' psychology.

  • Where's the data?

    By Evan Schuman | 18 March, 2015 01:56

    It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.

Reviews
 

Latest News

Apr 17
NetApp secures $2m supercomputing deal with NCI
Apr 17
Mandatory Disclosure Laws needed to counter lax security attitudes: Symantec
Apr 17
Alcatel-Lucent Enterprise gears for growth following China Huaxin takeover
Apr 17
Vocus buys $15 million stake in Macquarie Telecom
More News
21 Apr
APJ Progress Spark Conference
22 Apr
2015 Innotribe Startup Challenge
27 Apr
Disruptocon
27 Apr
Disruptocon
View all events