SolarWinds adds deep packet inspection to NPM

Network management supplier SolarWinds has added deep packet inspection to its flagship application. The company said Wednesday that the capability is one of several features added to Network Performance Monitor 11 for troubleshooting

Published on: July 30th, 2014 Howard Solomon

National Research Council hacked, China blamed

The national body responsible for business-led technology research has confirmed that its computer systems has suffered a cyber attack by what has been called a”highly sophisticated Chinese state-sponsored actor.” A statement issued by the National

Published on: July 30th, 2014 Nestor E. Arellano

Five BYOD best practices

Published on: July 29th, 2014 Howard Solomon

BlackBerry to buy German anti-eavesdropping provider

NEW YORK – BlackBerry is buying a German provider of anti-eavesdropping technology to extend its security protection from data to voice. The company told reporters here this morning it is buying Secusmart, a

Published on: July 29th, 2014 Howard Solomon

Elasticsearch vulnerability leads to DDoS malware on Amazon

Security professionals usually don't have to worry about the search engines their organizations chose for plowing through corporate data. But researchers at Kaspersky Labs say attackers are exploiting a vulnerability in the open

Published on: July 28th, 2014 Howard Solomon

Vendors team to offer key management solution for cloud data security

The increased use of cloud-based solutions is a boon and bane for CIOs. It's a boon because it helps control costs and can simplify infrastructure. It's a bane because of security risks associated

Published on: July 28th, 2014 Howard Solomon

Another key to security

In an era of digital key fobs, smart cards and fingerprint readers, the standard metal door key is so-old school. What security pro needs a key to get into a facility these days?

Published on: July 27th, 2014 Howard Solomon

Attackers turn to IE: Report

Know your enemy is a good defence for any country, or enterprise. So here's more advice for CSOs from another security vendor about what they're likely to face in the short term. Microsoft

Published on: July 27th, 2014 Howard Solomon

New Tor-based ransomware found

Knowledgeable consumers like anonymous Tor-- the Onion router -- network because it gives them an sense of security against Internet traffic analysis. However, IT professionals hate it for the same reason, because they

Published on: July 27th, 2014 Howard Solomon