By Year

By Type

  • In The News (1259)

By Topic

  • Cybersecurity (161)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1226)

By Language

Displaying 1471 to 1500 of 1585

RSA Breach Opens Door for New Security

RSA, the security division of EMC, is trying to contain the damage caused by hackers who penetrated its network and compromised technical specifications for its SecurID token-based multifactor authentication system.

  • 1
  • 1806

Palo Alto Extends Reach through OEM Partners

Palo Alto Networks is a brash security vendor that believes its playing the role of disruptor in the staid security market with its high-performance, multifunction firewalls. Competitors have dismissed the upstart as having little room to expand features and functionality beyond its core value proposition. The answer: Take on complementary partners that round out the features and functionality of a firewall.

  • 0
  • 1779

Firewall rules management fine-tunes operations

Organizations have been building security into their business infrastructure to avoid incurring additional acquisition and operational costs from standalone security products.

  • 0
  • 1980

Social media messaging is getting around traditional firewalls

Is the firewall obsolete? Probably not, but current implementations were never designed to cope with the threats posed by Webmail, various social networking tools, and even popular corporate collaboration applications like SharePoint and WebEx.

  • 0
  • 1755

Network Security Check-Up for Health Care Networks

Health care providers are an interesting situation with regard to network security. Like many industries, they’re dealing with rapid technological change in the face of a variety of regulations – in the U.S. health care industry it’s HIPAA and HITECH, and PCI – focused on the portability, security and privacy of PHI and the security of patients’ credit card data, respectively.

  • 0
  • 1874

The new Facebook threat to business

The Boy Billionaire, aka Facebook CEO Mark Zuckerberg, has done it again. His proposal to turn Facebook messaging into a sort of universal communications platform is probably the worst idea of the year. It's bad for the privacy of users and for corporate IT, which will have to deal with a huge spike in hard-to-defend Webmail.

  • 0
  • 1732

A Start-Up That Actually Met Its 'Hockey Stick' Revenue Projection

When pitching venture firms, entrepreneurs typically include a slide that shows revenue curving sharply up and to the right shortly after launch – what’s known as the “hockey stick” – but even the best companies rarely meet those projections.

  • 0
  • 1848

The Future of Network Security

The Future of Network Security with Nir Zuk.

  • 0
  • 1835

Facebook Users are Voyeuristic While at Work

There are several realities that typically fall outside of the approved enterprise communications mechanisms. These applications can enhance business responsiveness and performance – but, conversely – introduce inbound risks such as malware and vulnerability exploits, and outbound risks such as data loss and inadvertent sharing of private or proprietary data.

  • 0
  • 1832

Study Looks At Move To Cloud-Based Applications, Facebook Usage At Work

In its latest edition of the Application Usage and Risk Report, Palo Alto Networks draws attention to several realities that typically fall outside of the approved enterprise communications mechanisms.

  • 0
  • 1830

Global Usage of 'Saying, Socializing and Sharing' Applications Remarkably Consistent

Software applications that enable employees to communicate personally with each other, participate in social networks and share files with one another are being used in 96 percent of the organizations recently studied, and account for about one-quarter of the total bandwidth being consumed by those organizations.

  • 0
  • 1894

Next-generation firewalls not ready to replace all legacy firewalls

Next-generation firewalls, or application-aware firewalls, have enjoyed well-deserved hype from network engineers and analysts, but the technology is still evolving. Many enterprises are also holding onto their old port and protocol firewalls, at least for now.

  • 0
  • 1741

A-Teams of IT: How to build a crack strike force

IT is a tough job, but somebody's got to do it. And these days it takes a team of talented technology professionals, each with his or her own special expertise, to carry out mission-critical assignments.

  • 0
  • 1809

Top 10 Consumer Apps/Devices Infiltrating the Business

The war is over and, in case you missed it, IT lost. The once ferocious attempts to guard the corporate perimeters against unapproved devices and applications is sputtering to an end because, frankly, all but myopic IT diehards recognize this is battle that's already over.

  • 0
  • 1825

Report: Facebook Users in the Workplace are "Voyeurs"

It's 3 p.m. Do you know where your company's employees are? Probably not, because a whole lot of them are paging through Facebook, and not for business purposes either.

  • 0
  • 1928

Palo Alto Networks: Can VARs Assist Long-term March to IPO?

Palo Alto Networks has a concise message for channel partners: The security company was cash-flow positive in its most recent quarter, and is looking to double its business in the year ahead. To assist with that effort, Palo Alto Networks has recruited roughly 150 channel partners and is now working with two distributors: Westcon Group and Computerlinks.

  • 0
  • 1816

Palo Alto Expands Into Two-Tier Distribution In North America

Network security upstart Palo Alto Networks has signed distribution agreements with Westcon Group and Computerlinks, marking the first time Palo Alto's security products will be sold through two-tier distribution in North America.

  • 0
  • 1881

Network Security Vendor Palo Alto Networks Partners with Distributor Westcon

Palo Alto Networks, the three-year-old networking security vendor, has moved to two-tier distribution, signing with Westcon and Computerlinks. And Westcon has a new many to handle its security division, former Avnet executive Andrew Warren.

  • 0
  • 1757

Westcon Security names new VP, inks distribution partnership

Distributor has inked a deal with Palo Alto Networks to expand its solutions offerings

  • 0
  • 1732

What Product Blocks the Highest Percentage of Modern Threats?

As you probably know, last year Gartner recommended that enterprises migrate from stand-alone IPS to next-generation firewalls for performing IPS functions. While this advice made intuitive sense based on the tight relationship between apps and threats, there was nevertheless a lack of empirical evidence to confirm that a next-generation firewall could actually stand up to the challenge of being a true IPS – until now.

  • 0
  • 1753

Making the Next Generation Firewall Smarter for the Enterprise

Traditionally, firewalls have been designed to be cornerstone of network security. But, in reality legacy firewalls are no longer an effective security solution to manage the risks and rewards of today’s Internet applications in the enterprise.

  • 0
  • 1626

Why employees break security policy

It happens every day: an employee who's out of the office wants to get into his machine at work. Instead of using a more secure method, he decides to email some files to his home machine, or upload a file to Facebook, or use a popular PC file-sharing tool. And the next thing you know, your organization is dealing with a major data leak.

  • 0
  • 2079

Intrusion Prevention News and Errata

This week the Ponemon Institute released a study of almost 600 IT security professionals who overwhelmingly reported an increase in advanced threats and a lack of proper security mechanisms to deal with them.

  • 0
  • 1708

Palo Alto Networks Extends Firewall Visibility to Remote Endpoints

More and more applications are moving to cloud and more users are moving off-premise.

  • 0
  • 1669

Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Deny Service

Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can cause denial of service conditions.

  • 0
  • 1728

Palo Alto Allows Enterprises to Control Employee Usage of Facebook

When pitching venture firms, entrepreneurs typically include a slide that shows revenue curving sharply up and to the right shortly after launch – what’s known as the “hockey stick” – but even the best companies rarely meet those projections.

  • 0
  • 1709

Tech Brief

The iPad app that was famous for a few hours, a web browser that strips away adverts, and the man who bought his local police website as revenge for a speeding ticket.

  • 0
  • 1761

Next-Gen Firewalls: Control Apps and Protect Networks

In the past, firewalls worked based on their protocol to apply to all available applications. Next generation firewalls, like those being developed by Palo Alto Networks need to better control apps to protect the network. This Info Tech report discusses next-gen firewalls and how compliance and application usage is changing the role of the firewall in network security.

  • 0
  • 1721
Displaying 1471 to 1500 of 1585