Authors
Posts by Ericka Chickowski
thumbnail Ericka Chickowski

Ericka Chickowski

Content Writer
SMB Security Slack Continues

SMB Security Slack Continues   Vulnerable Customer Segment58% of all SMBs have recently been affected by cybercrime or Internet infections Vulnerable Customer Segment44% of U.S. SMBs have been hit by cybercriminals Vulnerable Customer Segment30% of organizations were so badly hurt by cybercrime that it affected productivity Vulnerable Customer Segment55% of SMBs still name viruses as […]

Jul 27, 2009
8 Black Hat Breakthroughs

8 Black Hat Breakthroughs by Ericka Chickowski EV SSL ExploitsA vulnerability in the way browsers handle Extended Validation SSL render the costly certs pretty darned useless until browser developers fix it. Researchers will show off a tool that leverages low assurance certificates to spoof Breaking the security myths of Extended Validation SSL CertificatesAlexander Sotirov, Mike […]

Jul 24, 2009
Outsourcing on the Way Out

Outsourcing on the Way Out The TPI Index, developed by the TPI sourcing data and advisory arm of Information Services Group, found that the number of Q2 contract awards valued at $25 million or more fell by 7.5%. No Title Annualized contract value (total contract value divided by duration of the contracts) fell 5% from […]

Jul 23, 2009
Wireless Service Overspend Presents a Channel Opportunity

The wild and wooly world of wireless service management is eating enterprises alive at the moment. According to a report released by Gartner this week, approximately 80 percent of enterprises will overspend on wireless services by an average of 15 percent for the next five years. While that’s bad news for some, it is a […]

Jul 23, 2009
PCI Council Offers Wireless Security Guidance

Security service providers and enterprises that deal with sensitive credit card information received valuable wireless security guidance last week with the publication of a new report by the PCI Security Standards Council. Known as the keeper of the PCI data security standards, PCI SSC released PCI DSS Wireless Guideline to offer organizations […]

Jul 22, 2009
New Browser Flaw Weakens EV SSL Trust

A newly discovered vulnerability in the way web browsers handle high-assurance Extended Validation SSL (EV SSL) certificates may render them ineffective until browser developers fix the problem, security researchers said today. EV SSL certificates were designed several years ago by certificate issuing authorities to combat the growing trust problems with normal domain validated SSL certificates […]

Jul 21, 2009
Radware Teams Up with RSA to Boost Real-Time Solutions

Radware is hoping to lure more business from managed security service providers (MSSPs) now that a new partnership with EMC’s RSA business will enable it to refine its intrusion prevention system (IPS) and Denial of Service protection solution. Radware announced last week a relationship with RSA that will enable Radware DefensePro customers to take advantage […]

Jul 20, 2009
Managed Security Market to Double by 2015

Managed Security Service Providers are thriving in the North American market as businesses struggle to keep up with data security concerns and compliance mandates, analysts with Frost & Sullivan announced Thursday. Even as other IT products and services are seeing declines or flat sales figures, Frost & Sullivan reports that MSSPs will continue to experience […]

Jul 17, 2009
CEOs Perceive Security Needs Differently, Study Finds

A new piece of research published by the Ponemon Institute on behalf of Ounce Labs found that there is a perception gap between the security expectations and priorities of CEOs and other C-level executives, including the CIO. Announced this week, “The Business Case for Data Protection” examines the results of a survey conducted by Ponemon […]

Jul 16, 2009
Rogue DBAs: Implementing Controls on Privileged Users

There are many reasons why enterprises are failing to hold database administrators (DBAs) accountable through monitoring and policy enforcement, but one of the big factors is historical inertia. “In every environment you have DBAs and sys admins and application developers and all those types of folks, who by nature of their privileged access have access […]

Jul 15, 2009
Rogue DBAs: Hidden Inside Security Threat

If your enterprise customers seem unaware of the dangers to their databases posed by rogue employees, it might be time to tell them the story of Timothy Curley. Employed by American Express as a database administrator; Curley was arrested on June 24 by the U.S. Secret Service on claims from his former employer that he […]

Jul 14, 2009
6 Do or Die Database Security Strategies

6 Do or Die Database Security Strategies As solution providers ponder how they can help customers protect their sensitive information, one of their key targets should be the corporate database. Databases are where most organizations store the bulk of their information and yet they remain woefully unprotected. According to the 2009 Data Breach Investigations Report […]

Jul 14, 2009
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.