endpoint security - News, Features, and Slideshows

News

  • Why don't risk management programs work?

    When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network World Editor in Chief John Dix asked two of the experts on that panel to hash out in an email exchange why these programs don't tend to work.

  • RSA: Big data, analytics services will secure data centers

    RSA, the security division of EMC, kicks off its annual security conference on IT security today with a pitch to establish its new Big Data Security and risk-governance products as a foundation for security operations centers. And RSA says it'll send in its security professionals to help set them up, too.

  • Guidance forensics tool now working with SIEM

    Guidance Software today said its <a href="http://www.networkworld.com/news/2010/031710-forensics-tools-help-companies-investigate.html">computer forensics</a> tool is now capable of automated collection of data on endpoint devices, including computers and <a href="http://www.networkworld.com/slideshows/2010/061510-smartphone-history.html">smartphones</a>, based on a <a href="http://www.networkworld.com/topics/security.html">security</a> information and event management (SIEM) alert.

  • NAC saves University of North Carolina money, keeps illegal file sharing in check

    Network access control (NAC) is saving the University of North Carolina at Chapel Hill $40,000 per year by keeping students from illegally using <a href="http://www.networkworld.com/community/blog/file-sharing-or-privacy-breaching-service-bew">peer-to-peer file-sharing</a> <a href="http://www.networkworld.com/topics/applications.html">applications</a>.

  • Death by Morto A? It's your own fault, says Microsoft

    The <a href="http://www.networkworld.com/news/2011/082911-new-windows-worm-spreads-by-250194.html">Morto A worm</a> is having continued success despite its reliance on a list of lame passwords to take over victim machines.

  • Black Hat: Apple does well but Microsoft does better with enterprise security

    While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, <a href="http://www.networkworld.com/news/2011/080411-blackhat-overview.html?hpg1=bn">researchers at Black Hat</a>  say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.

  • Researchers' SSL offloader costs fraction of commercial hardware

    Off-the-shelf graphic processing units can perform <a href="http://www.networkworld.com/news/2011/032611-in-iran-new-attack-escalates.html">SSL acceleration</a> as fast as high-end commercial SSL hardware at a fraction of the cost, according to researchers in Korea and the U.S.

  • PCI security group speaks out on encryption

    The organization in charge of defining security for the payment-card industry's merchants and service providers Tuesday issued two guidance papers, the first on end-to-end encryption and the second on payment card technology used more commonly in Europe than the United States.

  • Symantec lays out encryption roadmap

    Symantec is laying down a strategy for integrating the two encryption-software companies it acquired, PGP Corp and GuardianEdge Technologies.

  • ANZ users frustrated with endpoint security

    There's a groundswell of frustration about today's endpoint security, as well as worries about how newer technologies such as virtualisation or cloud computing will impact it, according to a new study.

[]