New UTM appliance from Fortinet

New UTM appliance from Fortinet

Fortinet Inc. continues to upgrade its 3000-series of unified threat management appliances for enterprises and service providers, most recently by...

February 18th, 2011 Howard Solomon

Four skills CISOs need now

Four skills CISOs need now

Information security leaders of the future need skills that go beyond security, according to Lee J. Kushner. After several years...

February 17th, 2011 Joan Goodchild

Hitachi unit rolls out Password Manager 7

Hitachi unit rolls out Password Manager 7

Hitachi ID Systems Inc. of Calgary announced this week a network security product designed to let users reset passwords using...

July 29th, 2010 Greg Meckbach

Concordia gets $400K in Cisco security technology

Concordia gets $400K in Cisco security technology

Concordia University in Montreal has received a donation of network security technologies from Cisco Systems Canada Inc. worth more than CD$400,000 so...

April 9th, 2010 Kathleen Lau

IT’s biggest enemy No. 1: The Ostrich

IT’s biggest enemy No. 1: The Ostrich

The biggest enemy of many IT pros: bosses who bury their heads in the sand when it comes to technology,...

February 2nd, 2010 Dan Tynan

Online attack hits US government Web sites

Online attack hits US government Web sites

A botnet composed of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing...

July 8th, 2009 IDG News Service

Network security trends and developments

Network security trends and developments

Security network infrastructure has been liked to protecting the entry points of a country from external attacks. Unlike computer security...

November 6th, 2008 IT World Canada Staff

China worries hackers will strike during Beijing Olympics

China worries hackers will strike during Beijing Olympics

SINGAPORE - While CNN recently faced distributed denial-of-service attacks from Chinese hackers angry about the television network's coverage of a...

April 23rd, 2008 Sumner Lemon

Security experts evaluate scoring system

Security experts evaluate scoring system

A standardized and vendor-neutral system that measures IT vulnerabilities has been updated to help IT managers prioritize their response to...

July 19th, 2007 Rafael Ruffolo