Articles by Thor Olavsrud 

Symantec Tells Users to Disable pcAnywhere, Cites Threat from Anonymous

In the wake of a threat by Anonymous to expose Symantec source code, the company advises customers to stop using pcAnywhere -- but says its antivirus software products are not at risk.

Symantec: Cyber Attacks May Be Costing Your Business $470,000 Annually

As the average cost of recovering from cyber attacks approaches half a million dollars per year, Symantec says it's time to beef up your defenses.

Symantec Unveils Consulting Services to Address Mobile Threats

The new services offering is intended to help organizations assess and mitigate the risk associated with deployment and use of mobile devices.

Centrify Updates Active Directory Integration Solution

Centrify Express 2012 seeks to ease the pain of IT professionals tasked with integrating Unix, Linux and Mac with Active Directory.

RSA DLP Suite Upgrade Secures Smartphones, Tablets

Seeking to help organizations control the lifecycle of their sensitive data, RSA introduces enhancements to DLP Suite 9.0 that helps them address smartphones, tablets and social media.

Do You Know Where Your Digital Certificates and Encryption Keys Are?

Venafi says more than half of enterprises can't account for digital certificates on their networks or encryption keys. The answer, it says, is automating management of these assets.

Cisco: Cybercriminals Will Focus on Money Laundering in 2011

According to Cisco's Annual Security Report, cashing out their ill-gotten gains has become cybercriminals' biggest bottleneck.

How Cybercriminals Make Their Millions

Botnets have become the online center of highly profitable criminal enterprises, but how do they actually rake in the cash?

eEye Automates Vulnerability and Compliance Management

The IT security firm debuts Retina CS 2.0 Management Console to provide its customers with end-to-end vulnerability and compliance management.

WikiLeaks Raises Questions of Information Security

If you work in information security, the latest WikiLeaks controversy should have you considering how your company deals with securing its data.

Cybercriminals Exploit Facebook Bug for Spam Campaign

Cybercriminals seized on Facebook users' woes earlier this week to spread a malicious downloader Trojan the old-fashioned way--by e-mail.

Survey: Twitter, Cloud, Mobile Concerns for IT

Information security functions are trying to adapt to the new world of mobile computing, cloud computing and social networking, but at the end of the day, it's really about data loss prevention.

9 Best Defenses Against Social Engineering Attacks

No matter how tight your network security or well-considered your security policy, the human element at your business remains vulnerable to hackers. But there are steps you can take to tighten your security against social engineering attacks.

New Virtualized Network Security Appliances from Fortinet

The network security provider introduces virtual versions of its FortiGate, FortiManager, FortiAnalyzer and FortiMail appliances, promising better visibility and security within cloud environments.

Paessler Unveils PRTG Network Monitor 8

The latest version of Paessler's network monitoring suite features fail-over clustering and Linux support, as well as a simplified licensing structure.

Symantec's New Mobile Security, Management Strategy

Aiming to extend its offerings from the PC to the mobile sphere, Symantec has announced a new mobile security and management strategy that encompasses solutions for enterprises, consumers and communication service providers.

New Service to Protect Networks from Botnets

Nominum, a provider of intelligent DNS solutions, has created a real-time feed of bot-related malicious domains that network owners can leverage to block the propagation of botnets and other malware.

Study: Data Loss Affects Nearly One-Third of Enterprises

Data loss events are continuing at a "fairly alarming rate" according to Keith Crosley of cloud-focused security firm Proofpoint, which recently released its seventh annual study of data loss in the enterprise.

Deloitte: Financial Services Firms Prioritize IAM

While financial services firms across the world continue to make budget cuts, Deloitte says the knife has passed over many information security budgets, and those firms are turning their attention to Identity and Access Management (IAM).

PacketMotion Eases the Pain of Internal Firewalling

PacketSentry 4.0, the latest version of PacketMotion's flagship product, delivers PCI segmentation capabilities with an agentless, non-line platform.

Companies Fail DefCon Social Engineering Security Test

DefCon contest proves your company's greatest security weakness is likely loose-lipped employees who can be scammed into revealing sensitive data more easily than you might think.

Fortinet Debuts 1 Gbps Firewall in New Security Appliances

The network security provider delivers new levels of performance in an entry-level appliance aimed at distributed enterprises, SOHOs and small businesses, and service providers delivering managed services in CPE deployments.

GlobalSCAPE Bets on Cloud for Managed File Transfer

San Antonio-based GlobalSCAPE has partnered with Rackspace Hosting to provide its Enhanced File Transfer Server as a subscription.

New OTP Solution Utilizes Mobile Phones

A cloud-based authentication specialist wants to make financial transactions more secure through the use of one-time password technology on mobile devices.

FireEye Touts Next-Generation Malware Protection

New inline threat-prevention appliance incorporates integrated Malware-VM and Malware-Callback filters to inoculate networks.