Offering up more general guidelines to strengthen the country's critical infrastructure security - as in the president's recent executive order - is all well and ...
Security incidents at the U.S. Department of Health and Human Services and Zaxby's Franchising, and more.
The latest acquisitions and personnel moves from the likes of CipherCloud, Yahoo, Marble Cloud, Twitter, and more.
Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.
The European Union is close to implementing an information protection law that will homogenize the responsibility of all of its 27 member states, which could ...
Adam Weissman, director of legal technology at The Glenmont Group, says a significant expansion of IT infrastructures has increased demand for experienced penetration testers.
Dominic Vogel, IT security analyst at a financial institution in British Columbia, Canada, shares how he entered the information security field and the challenges he ...
This month's featured debate informs whether the FTC should have the right to penalize companies for poor data security/privacy practices.
IT trends - cloud, social networking and BYOD - are making the practice of security management complex, and are forcing organizations to shift to a ...
Information security executives must work to "engineer" their organizations to be better, faster, cheaper - and more secure, says Rafael Diaz, CISO, state of Illinois.
Our program profiling the winners and finalists of the 2013 SC Awards U.S., held Feb. 26 in San Francisco.
John South joined Heartland Payment Systems when it still was reeling from a devastating breach...and it's the best career decision he's ever made. Dan Kaplan ...
With almost daily advanced attacks, organizations of all sizes must be at the ready, according to respondents to this year's "Guarding Against a Data Breach" ...
Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker.
Prior to a job switch, ask questions to learn if the company you are considering is in good shape, says former Yahoo CISO Justin Somaini.
The UTM started out as an evolution from multipurpose devices some years back, but has now morphed into a well-defined product that has morphed again ...
How unified is "unified"? Judging by this year's crop of unified threat managers under review, pretty doggone unified, says Peter Stephenson.
The Threat Prevention Appliance from Check Point provides full-scale threat protection at the perimeter, as well as incorporating with endpoint security applications to provide a ...
The CR2500iNG unified threat management appliance from Cyberoam offers a multitude of security and threat prevention features for the network perimeter.
The NSA E8510 from Dell SonicWALL is a monster security appliance designed for the large enterprise environment.
This product offers a stateful firewall with deep packet inspection capabilities, proxy-based scanning, real-time threat monitoring, scanning of both web and email for worms and ...
This product can protect the perimeter of the network with a firewall, intrusion prevention system and IPsec and SSL VPN.
This product features a full firewall with intrusion detection and prevention system; anti-malware at the gateway, including protection from viruses, worms and spyware; spam protection; ...
Kerio Control provides a clear, snappy interface for administration.
Unified threat management solutions shouldn’t be limited to large corporations with unlimited budgets. NETGEAR agrees, and offers their ProSecure UTM25S at a price point that ...
Targeting small to midsized offices with up to 150 users, it combines standard UTM offerings with a few features we didn't expect, making this product ...
Administrators of smaller environments on a fixed budget could do very well by the aXsGUARD Gatekeeper by VASCO Data Security. While a little more complicated ...
WatchGuard XTM 830, though somewhat pricey, provides an excellent enterprise-grade perimeter defense against viruses, spam and other unwelcome traffic.
The Wedge Networks 1005G looks good on paper, but in reality is a little disappointing. While the initial setup was easy enough, ease-of-use issues and ...
Don't presume the vShield will protect you. That actually is not the case, says Peter Stephenson.
VMC takes advantage of the nature of a virtual data center.
GravityZone lets users bounce between various computing environments: physical, virtualized and mobile.
McAfee has successfully brought together the application of a centralized policy engine – ePO – with its anti-malware capability in the physical world.
One might characterize CSP as a security wrapper for mission-critical environments.