Security News & Analysis
| Friday Dec 6, 2013
How about a scare for the weekend? According to internet security firm Trustwave, more than 2 million passwords for social media sites including Facebook and Twitter, as well as passwords for Yahoo and Google, have been hacked and posted online.
| Wednesday Dec 4, 2013
Clouds, in nature as in computing, are big, amorphous and hard to pin down. In this age of cloud computing and other vulnerabilities, how can companies best get a handle on their information risk? A new report aims to find out.
The report, “Information Risk: Managing digital assets in a new technology landscape” from The Economist Intelligence Unit, finds "information is now big, borderless and beyond the control of individual companies.” Clouds are only one contributor, complementing risks from collaboration, data sharing, supply chain integration and outsourcing.
| Tuesday Dec 3, 2013
MetaVis just unveiled new capabilities for Office 365 and SharePoint Online that will provide users with tighter administration and governance of their cloud-based content. According to MetaVis, the capabilities fill important holes in Office 365 environments by offering views of everything that happens to content inside those environments.
| Thursday Nov 14, 2013
IBM is aggressively expanding its mobile management capabilities with the announcement last night that it is buying Fiberlink Communications. The acquisition will enable it offer clients the ability to develop secure Bring Your Own Device (BYOD) strategies through IBM’s MobileFirst applications.
| Tuesday Nov 12, 2013
Sure the development of the Internet of Things has a way to go before it becomes a reality. But IT research firm Gartner already estimates it will be worth $1.9 trillion by 2020. Gartner also predicts the Internet of Things will create an entire new economy based on interconnectivity of devices.
| Wednesday Nov 6, 2013
While there’s no question that cloud computing is here to stay, the numbers suggest that the need to manage content in the cloud has a variety of business drivers. The challenge facing organizations is that these various drivers are not necessarily consistent or aligned with each other.
| Friday Nov 1, 2013
Two shuttered encrypted email service providers are joining forces in the aftermath of the US National Security Agency (NSA) spying scandal. Lavabit and Silent Circle have set up the Dark Mail Alliance to restore privacy to inboxes.
They're developing an open-source tool that could make peer-to-peer, end-to-end encryption a simple add-on for any email service — and they’re hoping major providers like Google and Microsoft will come on board.
| Monday Oct 28, 2013
The so-called Internet of Things? Fugetaboutit ... at least for a while. The Internet of Things refers to a world where everyday physical objects are connected to the Internet and are able to identify themselves to other devices.
According to new research from Forrester, the concept is well developed, but the reality is three to five years away. But the delay is a good thing: it gives marketers a chance to optimize the Internet of Things for customer engagement.
| Wednesday Oct 23, 2013
Metalogix has been steadily buying up hefty swaths of the Microsoft SharePoint ecosystem -- and it's now bought up Idera's SharePoint business. It includes tools that focus on backup, maintenance, security and governance.
| Wednesday Oct 23, 2013
A quarter of all company security leaders have deployed mobile security in the past month, but they’re still playing “catch-up” as they try to wrap policies and technology around the Bring Your Own Device (BYOD) trend. That’s one of the findings in the second annual IBM assessment of Chief Information Security Officers (CISOs).
Some characteristics of highly effective security leaders, from new IBM report
| Thursday Oct 17, 2013
Oracle has announced the release of a massive security patch for Java that addresses at least 51 identified security vulnerabilities. If you think this does not affect you, keep in mind that Oracle says 89 percent of desktops run Java in one form or another.
| Friday Oct 4, 2013
Adobe has confirmed that one of its servers has been hacked. In a statement that appeared on an Adobe blog by Adobe security chief Brad Arkin, the company admits that the attackers removed information on 2.9 million customers, including names, encrypted credit and debit card numbers, card expiration dates, and information relating to customer orders.
| Thursday Sep 26, 2013
A modest iOS update follows in the wake of all last week's hoopla, fixing some of the more glaring security issues with Apple's new smartphone operating system.
| Wednesday Sep 25, 2013
In the second release in as many weeks, UK-based HighQ has announced the release of a new cloud-based tool that offer enterprises the ability to create due diligence reports in the cloud.
| Tuesday Sep 17, 2013
Enterprise collaboration software is not worth much if you can't get files from one user to another. OpenText today released a new product for transferring large files outside the firewall based on the integration of two of its existing products.