Date

By Industry

By Product Category

  • Prisma Cloud (2)

By Features

By Technology

By Services

By Audience

By Language

  • English (1)
Displaying 3151 - 3180 of 3210

Blogs

Tell Us Why 400% Growth is a Good Thing

ANALYSIS – This ZeroPaid article projects some fairly aggressive growth for the use of P2P technology and in most markets, a 400% increase would be somewhat uplifting, particularly in this dismal economy. …
Matt Keil,

Blogs

An in the Cloud Smackdown?

ANALYSIS – This Lifehacker article, like many others this past week, highlights the long talked about move by Microsoft to make Office available as an in-the-cloud/web service or whatever the latest definition …
Matt Keil,

Blogs

Out-of-Band Microsoft Security Bulletin

Microsoft announced an unscheduled security bulletin today at 10AM PST that they have a critical vulnerability (MS08-067) which affects Windows 2000, XP, 2K3 Server, Vista, and 2K8 operating systems. This vulnerability is …
Alfred Lee,

Blogs

Dogs and Cats Living Together?

ANALYSIS – This SearchSecurity article discusses the need for businesses units to not only talk with security teams but to go so far as to establish a partnership that benefits the company …
Matt Keil,

Blogs

McAfee’s Acquisition Reminded Me That Proxies Generally Suck

A couple of weeks ago, McAfee acquired Secure Computing for $465M. For those who missed the irony in it, McAfee had previously sold a big portion of its network security business to …
Nir Zuk,

Blogs

Google and the Five Stages of Grief

This week Google has announced the Chrome browser. I tried it. It is ok for now – not great – but ok. It’s fast and clean but missing some key features and …
Nir Zuk,

Blogs

What has happened to network security innovation?

Does anyone out there share my feeling that innovation in network security has become quite scarce? I mean, look at it – the core of network security, the almighty firewall, hasn’t changed …
Nir Zuk,

Blogs

Will the Olympics Be Any Fun for Network and Security Admins?

ANALYSIS – Today marks the official start of the 2008 Olympics in Beijing, and will no doubt be watched by millions and millions of people both in the traditional manner (TV) as …
Matt Keil,

Blogs

Got any hot stock tips?

ALERT – If you don’t, your employees probably do. There is a lot of stock discussion that goes on in the financial message boards and there are many examples of well-intentioned employees …
Alfred Lee,

Blogs

Maybe it’s the name change?

ANALYSIS – While it may not fall into the original, and somewhat ill fated definition of software as a service (SaaS), these two articles highlight the reasons why the new generation of …
Matt Keil,

Blogs

We will take over the digital world – resistance is futile

ALERT – In their quest to control all things digital, Google has announced a media server adding to their long list of applications and services. First it was Google Desktop to help …
Matt Keil,

Blogs

Online file transfer – the next P2P?

ANALYSIS – In recent months, new online file transfer and storage applications have popped up with increasing frequency and the latest, Docstoc makes concerted efforts to simplify the upload process by installing …
Matt Keil,

Blogs

When Social Networking Becomes an Application

ANALYSIS – Most people would agree that Facebook is a far cry from the early days of Web 1.0 but only a few are willing to admit that it is not only …
Frank Fang,

Blogs

P2P Networks: A Treasure Trove of Data

ANALYSIS – Music and video are not the only things you can find on P2P networks. Sure, everyone has heard about the massive loss of employee data caused by P2P usage but …
Matt Keil,

Blogs

What is this application and what should I do with it?

The rapid evolution of the application landscape has security administrators scrambling to determine which applications are traversing the network and how they should treat them. More and more applications, both business and …
Matt Keil,

Blogs

File Sharing Sites On the Rise

ALERT – FileDropper is yet another online file sharing site that allows users to upload files, in this case, up to 5 GB to a site and receive a URL which they …
Matt Keil,

Blogs

Taking a Page From the Google Playbook?

ANALYSIS – This SearchSecurity.com article on Tor (The Onion Router) tries to build a case for using TOR within a corporate environment and in fact have come out with a feature to …
Matt Keil,

Blogs

Be Afraid. Be Very, Very Afraid.

ANALYSIS – A great article in CIO magazine that highlights nine consumer technologies that CIOs should be scared of (VoIP clients, web-based productivity tools, digital cameras, remote online storage, smart-phones, and social …
Matt Keil,

Blogs

Once You Check In, You Can’t Check Out

ANALYSIS – Just in case you did not have a good reason to stay away from social networking sites, this article from the NY Times should provide one for you. Or at …
Matt Keil,

Blogs

Could it be Just a Matter of Time?

ANALYSIS – While not quite as blunt as earlier articles (InfoWorld), the message that Google is relaying to IT departments in this WSJ Online article is this—resistance is futile—our applications will be …
Matt Keil,

Blogs

What’s Leaking Through Your Webmail Account?

ANALYSIS – This article is a perfect example of why enterprise organizations should take a close look at their policies on use of webmail accounts. More and more employees rely on their …
Matt Keil,

Blogs

When is Facebook Considered an Enterprise Application?

ANALYSIS – This Network World article raises an interesting question. And the answer is Facebook and other web 2.0 applications, can be considered enterprise applications when they are used internally as collaboration, …
Matt Keil,

Blogs

If It Works Here, It’ll Work Everywhere

ANALYSIS – As more and more schools look to gain visibility into the use of peer-to-peer (P2P) and other applications running on their networks, UC Santa Cruz, arguably one of the more …
Matt Keil,

Blogs

A Deal With the Devil?

ANALYSIS – This article is downright humorous. Here we have two networking companies, each with security products or at a minimum, security features, who have indirectly endorsed the same application category (P2P) …
Matt Keil,

Blogs

Web Site, Application or Both – Threats related to Facebook are Increasing

ALERT – A new threat on Facebook that tricks a user to download spyware is the latest threat to show up on social networking sites such as Facebook and it raises an …
Matt Keil,

Blogs

LimeWire Claims: We’re #1!

ANALYSIS – This article highlights the fact that even with the negative publicity, the risk of lawsuit or loss of personal information, P2P applications remain extremely popular. The application is supposedly installed …
Matt Keil,

Blogs

To Blog or Not to Blog

ALERT – Blog. At least that is what more and more people are turning to when they want to express themselves. As with most applications, blogging is not inherently bad. However, it …
Matt Keil,

Blogs

Do End Users Read the Privacy Statements?

ANALYSIS – Google Desktop is one of those applications that can be seen as a productivity tool by end-users and a huge security hole by security experts. This CSO article outlines how …
Matt Keil,

Blogs

Comcast wants to block BitTorrent… How about you?

ANALYSIS – Comcast, the Internet Service Provider, has allegedly been throttling traffic for subscribers who are using peer-to-peer (p2p) applications such as BitTorrent. Comcast has justified this action by claiming BitTorrent and …
Matt Keil,

Blogs

Another Subtle Reminder on the Risks of P2P…

ANALYSIS – In this Wall Street Journal article, the author does a great job of highlighting the hidden risks of P2P applications. With more than 450 Million copies of P2P software deployed, …
Matt Keil,
Displaying 3151 - 3180 of 3210