Security

Recent Articles

  • Microsoft Office Users Attacked by Cybercriminals

    (Reuters) – Microsoft Corp warned that cybercriminals have attacked users of its Office software for Windows PCs, exploiting a programing flaw that the software giant has yet to repair. The world’s largest software maker issued the warning on Tuesday as it released patches to address nine other security holes in its software. "Despite today’s fixes,…

  • Juniper Expands Capabilities of Adaptive Threat Management

    The networking vendor has been building out its Adaptive Threat Management solution since last summer when it made announcements around high-end routing and switching, but now it’s broadening the solution. While WAN acceleration capabilities have been available for some time, the new WAN acceleration capabilities in the Juniper product are focused around identity- and role-based…

  • Rogue DBAs: Implementing Controls on Privileged Users

    There are many reasons why enterprises are failing to hold database administrators (DBAs) accountable through monitoring and policy enforcement, but one of the big factors is historical inertia. “In every environment you have DBAs and sys admins and application developers and all those types of folks, who by nature of their privileged access have access…

  • Ingram Micro Pays $15M Fine for Channel Stuffing Scheme

    IT distributor Ingram Micro paid a hefty price for helping Network Associates (now McAfee) in an elaborate channel stuffing scheme over a period of two years that inflated Ingram Micro’s profit margins and McAfee’s revenues by hundreds of millions of dollars during the height of the dot-com boom. Ingram Micro has paid a $15 million…

  • Rogue DBAs: Hidden Inside Security Threat

    If your enterprise customers seem unaware of the dangers to their databases posed by rogue employees, it might be time to tell them the story of Timothy Curley. Employed by American Express as a database administrator; Curley was arrested on June 24 by the U.S. Secret Service on claims from his former employer that he…

  • 6 Do or Die Database Security Strategies

    6 Do or Die Database Security Strategies As solution providers ponder how they can help customers protect their sensitive information, one of their key targets should be the corporate database. Databases are where most organizations store the bulk of their information and yet they remain woefully unprotected. According to the 2009 Data Breach Investigations Report…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.