Security

Recent Articles

  • New Exploit Targets Older Versions of Internet Explorer

    Symantec is reporting that older versions of Microsoft Internet Explorer are susceptible to a new attack against a vulnerability in its cascading style sheets (CSS). While a working exploit hasn’t been detected, Symantec suspects that it’s only a matter of time before hackers start actively using this new vulnerability with a full-functioning exploit.   According…

  • Global Warming Email Disclosure Reveals Strategic Thinking

    The security breach that resulted in the release of email correspondence between global warming scientists is being compared to such history information disclosures as The Pentagon Papers and Nixon’s Oval Office tapes. What the messages reveal is more than just the venomous relations among scientists on both sides of the issue, but the strategies and…

  • Global Warming Email Hack Reveals Value of Routine Correspondence

     Several solution providers and security vendors have told me of late that the biggest stumbling block in selling protection technology to SMBs is their perception that they have nothing to protect. Perhaps that’s true since the value of the information is in the eyes of the owner, and many don’t consider email to be necessarily…

  • Understanding the State of Endpoint Security

    Understanding the State of Endpoint Security What You Need to Know About the State of Endpoint SecurityBy Ericka Chickowski No Title The Ponemon Institute recently conducted a study on behalf of Lumension to take the pulse of decision makers from both IT security and IT operations groups about endpoint management and security. Unsurprisingly, Ponemon found…

  • Seven Tips for Scalable Security Training

    One of the biggest ways channel partners can add value to their IT security implementations is to complement technology and consulting with a mature portfolio of security training offerings. As the famous hacker Kevin Mitnick will attest, people are every organization’s weakest link when it comes to keeping systems and data locked down. But what…

  • AVG Finds Scareware that Downloads Porn

    Rogue software and Trojans have perfected the art of appearing like a legitimate antivirus applications and tricking users into paying for cleaning up there system. As computer users become more aware of this threat, the scareware purveyors are turning to a new trick: porn. Roger Thompson, the chief scientist at AVG, has found new scareware…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.