Businesses will have to redesign their networks from the ground up if they hope to protect their data from next-generation hackers, according to McAfee president Michael DeCesare. DeCesare said business and high-tech companies will have to use a by-design strategy if they wish to remain ahead of the threats they face. He was speaking during a keynote at the McAfee Focus conference. “We have to figure out how to integrate security into [networks] from the […]
malware
Security exists to protect the tangible things in life. If something is deemed special enough to be protected, we do so with highly visible declarations of security. Deadbolts on doors are large and comforting; alarm systems used to protect buildings are there for all to see; seatbelts in cars tell the world that we are taking our safety seriously. While protecting homes and possessions is simple human behaviour, there are important aspects of day-to-day life […]
As the second law of thermodynamics tells us, all things trend toward chaos and this is no less true with a virtual environment. Sprawl can have a real security impact, and it takes discipline and planning to control sprawl — discipline and planning that won’t occur without someone from the security team actively monitoring the problem and formulating strategies for how to address the issue. Virtualization has been one of the most rapidly and widely […]
Few organizations have moved to cloud computing — the delivery of computing as a service from remote centers — and of those that have, many are disappointed with the results, a survey published on Tuesday found. Fewer than one in five organizations questioned have outsourced the hosting of their applications to cloud computing providers, with two-thirds in early discussions, in trials or not considering a move, said computer security firm Symantec. Many firms are looking […]
The need for technological protection has spawned a burgeoning industry in Dallas-Fort Worth. Economic instability. The explosion of cloud computing. The swift growth of e-commerce and online financial transactions. The rapid spread of mobile devices loaded with digitized information. The spread of social networking. These are just a few of the technological forces wreaking havoc with commercial and personal security. With the digitization of more and more elements of our social fabric comes a parallel […]
In less than a decade, the global mobile Internet has emerged as a phenomenon that directly impacts the lives of 1 out of every 8 persons living on the planet. As businesses of all types scramble to prepare for the unstoppable wave of mobile commerce unleashed by this socio-economic revolution, the need for strengthening mobile security has never been greater. The mobile device market reached a critical inflection point at the start of 2011: For […]
If you haven’t tried virtualization yet–or don’t even know what it means–it’s about time you did. Here are 10 reasons to tempt you into the virtualization waters. Virtualization isn’t just for geeks or those who run enormously powerful servers. It offers something for everybody, and if you haven’t yet dipped your toe into the virtualization ocean, then you’re at serious risk of being left behind. In its strictest sense, virtualization refers to running two or […]
Tablet computing use has been proliferating faster than rabbits in springtime. Tablets bring with them increased mobility and ease of use coupled with a more interactive and immersive experience. Whether you fancy the Apple iPad or one of its rivals, there’s likely a tablet in your future. Executives and other persuasive users are demanding that tablets be allowed access to their work resources. And these users don’t understand why IT departments see the trend as […]
As your organization relies more on cloud-based applications for productivity and business success, you must be increasingly vigilant against Web-borne attacks. As sensitive data now migrates between corporate data centers and cloud data centers beyond your network perimeter, you can no longer think only in terms of network security, but instead must shift focus to information security. Three overarching, interrelated trends — cloud consumption, virtualization and mobility — present themselves as key industry themes for […]
CSO recently interviewed Gary Loveland, a principal in PricewaterhouseCooper’s advisory practice and head of the firm’s global security practice, about the latest in cloud security issues. Loveland has functioned as a data security officer and has recommended and implemented security strategies in large-scale business environments. CSO: What do you consider to be the most serious security threats related to cloud computing? Loveland: One of the most serious security threats to cloud computing is the fact […]
Every year or two, we face a new unstoppable IT trend that threatens the way we handle network security . Think instant messaging, USB keys, social media sites, and mobile computing. There are more on the way, as I wrote about last week, including Web 2.0 and cloud computing. Tracking these new computing trends is important for IT admins: They represent a potential swath of new opportunities for attackers to breach systems, steal data, and […]