Stories by Ellen Messmer

Dell jumps into enterprise mobility management

Dell Software Wednesday introduced a suite of software and services for enterprise mobility management, including a "secure workspace" for mobile devices that lets enterprise IT managers separate work from data apps.

Cloud Security Alliance offers ultra-high cloud security plan

The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.

IBM acquires Fiberlink as mobile-security strategy keystone

IBM Wednesday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android smartphones.

12 hot US security start-ups to watch

Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.

Should the NSA be reformed? Fierce debate rages

There are now resounding calls to drastically change the secretive National Security Agency in the wake of the documents leaked by former NSA contractor Edward Snowden. Some advocate a completely re-made spy agency, others say moves that drastic would hurt national security.

Sophos takes first step in rolling out cloud security strategy

Sophos today leapt forward with a cloud strategy under which it will deliver integrated management and policy enforcement for its endpoint security software and unified threat management (UTM) firewall through a cloud-based console for both its enterprise customers and industry partners.

Microsoft and Symantec push to combat key, code-signed malware

An alarming growth in malware signed with fraudulently obtained keys and code-signing certificates in order to trick users to download harmful code is prompting Microsoft and Symantec to push for tighter controls in the way the world's certificate authorities issue these keys used in code-signing.

[]