Thor Olavsrud - ALL ARTICLES - PAGE 1

Symantec Tells Users to Disable pcAnywhere, Cites Threat from Anonymous

January 27, 2012
In the wake of a threat by Anonymous to expose Symantec source code, the company advises customers to stop using pcAnywhere -- but says its antivirus software products are not at risk.
READ MORE

Symantec: Cyber Attacks May Be Costing Your Business $470,000 Annually

January 18, 2012
As the average cost of recovering from cyber attacks approaches half a million dollars per year, Symantec says it's time to beef up your defenses.
READ MORE

Symantec Unveils Consulting Services to Address Mobile Threats

December 6, 2011
The new services offering is intended to help organizations assess and mitigate the risk associated with deployment and use of mobile devices.
READ MORE

Centrify Updates Active Directory Integration Solution

November 22, 2011
Centrify Express 2012 seeks to ease the pain of IT professionals tasked with integrating Unix, Linux and Mac with Active Directory.
READ MORE

RSA DLP Suite Upgrade Secures Smartphones, Tablets

November 15, 2011
Seeking to help organizations control the lifecycle of their sensitive data, RSA introduces enhancements to DLP Suite 9.0 that helps them address smartphones, tablets and social media.
READ MORE

Do You Know Where Your Digital Certificates and Encryption Keys Are?

February 8, 2011
Venafi says more than half of enterprises can't account for digital certificates on their networks or encryption keys. The answer, it says, is automating management of these assets.
READ MORE

Cisco: Cybercriminals Will Focus on Money Laundering in 2011

January 20, 2011
According to Cisco's Annual Security Report, cashing out their ill-gotten gains has become cybercriminals' biggest bottleneck.
READ MORE

How Cybercriminals Make Their Millions

December 22, 2010
Botnets have become the online center of highly profitable criminal enterprises, but how do they actually rake in the cash?
READ MORE

eEye Automates Vulnerability and Compliance Management

December 7, 2010
The IT security firm debuts Retina CS 2.0 Management Console to provide its customers with end-to-end vulnerability and compliance management.
READ MORE

WikiLeaks Raises Questions of Information Security

December 3, 2010
If you work in information security, the latest WikiLeaks controversy should have you considering how your company deals with securing its data.
READ MORE

Cybercriminals Exploit Facebook Bug for Spam Campaign

November 24, 2010
Cybercriminals seized on Facebook users' woes earlier this week to spread a malicious downloader Trojan the old-fashioned way--by e-mail.
READ MORE

Survey: Twitter, Cloud, Mobile Concerns for IT

November 23, 2010
Information security functions are trying to adapt to the new world of mobile computing, cloud computing and social networking, but at the end of the day, it's really about data loss prevention.
READ MORE

9 Best Defenses Against Social Engineering Attacks

October 19, 2010
No matter how tight your network security or well-considered your security policy, the human element at your business remains vulnerable to hackers. But there are steps you can take to tighten your security against social engineering attacks.
READ MORE

New Virtualized Network Security Appliances from Fortinet

October 15, 2010
The network security provider introduces virtual versions of its FortiGate, FortiManager, FortiAnalyzer and FortiMail appliances, promising better visibility and security within cloud environments.
READ MORE

Paessler Unveils PRTG Network Monitor 8

October 8, 2010
The latest version of Paessler's network monitoring suite features fail-over clustering and Linux support, as well as a simplified licensing structure.
READ MORE

Symantec's New Mobile Security, Management Strategy

October 5, 2010
Aiming to extend its offerings from the PC to the mobile sphere, Symantec has announced a new mobile security and management strategy that encompasses solutions for enterprises, consumers and communication service providers.
READ MORE

New Service to Protect Networks from Botnets

October 4, 2010
Nominum, a provider of intelligent DNS solutions, has created a real-time feed of bot-related malicious domains that network owners can leverage to block the propagation of botnets and other malware.
READ MORE

Study: Data Loss Affects Nearly One-Third of Enterprises

September 22, 2010
Data loss events are continuing at a "fairly alarming rate" according to Keith Crosley of cloud-focused security firm Proofpoint, which recently released its seventh annual study of data loss in the enterprise.
READ MORE

Deloitte: Financial Services Firms Prioritize IAM

August 30, 2010
While financial services firms across the world continue to make budget cuts, Deloitte says the knife has passed over many information security budgets, and those firms are turning their attention to Identity and Access Management (IAM).
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|