Security

Recent Articles

  • Top Sources of Data Loss Prevention Technology

    Top Sources of Data Loss Prevention Technology The Microsoft-RSA alliance to create next-generation data loss prevention products could be a game changer, but there are plenty of existing DLP products on the market. The following are a sample of DLP market leaders. No Title The firewall pioneer began expanding its security horizons with the acquisition…

  • Microsoft, RSA Partner to Develop Next-Gen Data Loss Prevention

    In unveiling a new technology sharing and development alliance, Microsoft and RSA—the security division of storage giant EMC—took the first step toward creating the next-generation of data loss prevention technology in which the protection of sensitive digital assets will eventually reside in the fabric of the IT infrastructure. Microsoft will integrate RSA’s data loss prevention…

  • Spammers Out Innovating SMB Security

    In 2006, e-mail security provider MXLogic conducted a SMB survey that found the smaller the company, the more likely it was to be vulnerable to e-mail threats. Since then, there’s been an explosion of security technologies that promise SMBs protection from e-mail borne threats. With all this technology available, and with a growing number of…

  • Adobe Acrobat 9 Passwords Not Secure, Claims Company

    Eight-character passwords for Adobe Acrobat PDF documents are no longer a reliable security protection, says Russian security software vendor ElcomSoft. In a press release issued this week, the vendor of password recovery tools says the security measures in the latest version of Adobe’s PDF software, Acrobat 9, is two-orders of magnitude easier to crack than…

  • Cybercrime Paying Well, Growing Strong

    As the legitimate economy careens toward a recession, a new study by Symantec shows one area that’s seemingly immune to the downturn–cybercrime. Symantec’s study was performed over a yearlong period where the security giant spied on a number of digital underground forums. The underground economy seems to be made up of a number of loosely…

  • Convergence: The Next Security Wave

    When I arrive at my Manhattan office, I’m required to pass an ID card over a turnstile reader to gain entry to the building. The same card unlocks the doors to the Ziff Davis Enterprise floor. But once I reach my office, the HID card is useless. To gain access to my network and applications,…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.