Sean Michael Kerner

About

Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

HP Fortifies Threat Intelligence

Hewlett-Packard is bolstering its security initiatives with new university outreach, threat collection and open-source code scanning efforts. According to research from the Ponemon Institute cited by HP, in 2014 as many as 40 percent of security jobs will be vacant and unfilled due to a lack of skilled professionals, which is a challenge that HP […]

Adobe Updates for Zero-Day Risk, Handles Emergency

Adobe issued an unscheduled zero-day update for a security issue on Feb. 20 for its Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh, and Adobe Flash Player 11.2.202.336 and earlier versions for Linux. “These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system,” Adobe warned in […]

SUSE Cloud 3 Heats Up OpenStack Havana

Linux vendor SUSE today announced its SUSE Cloud 3 solution, providing users with the latest components from the OpenStack Havana release. OpenStack is a multi-stakeholder open-source cloud platform effort that counts many of the world’s leading IT vendors—including IBM, Hewlett-Packard, Dell and Cisco—among its participants. The most recent OpenStack release, code-named “Havana,” debuted in October […]

AlienVault Advances Open-Source SIEM

Security vendor AlienVault released a milestone update on Feb. 19 for both its open-source and commercial Security Information and Event Management (SIEM) solutions, aiming to provide an improved user experience and enhanced security visibility. SIEM technology plays a pivotal role in the modern security landscape, enabling organizations to log and monitor security events. The Open […]

Belkin Says It Fixed WeMo Flaws Noted in IOActive Security Advisory

Belkin International issued a statement late on Feb. 18 that it has fixed vulnerabilities in its WeMo line of home-electronics control devices that were reported by security research firm IOActive. Earlier on Feb. 18, IOActive issued a public advisory warning of vulnerabilities in Belkin’s WeMo connected home devices. The WeMo product line includes Internet connected […]

Bluebox Unveils Mobile App Security Offering

Bluebox emerged from stealth mode today with a new offering that aims to address mobile app security demands. Instead of trying to solve the bring-your-own-device (BYOD) challenge, Bluebox is positioning itself to offer bring-your-own-apps (BYOA) technology for both Android and IOS devices. Bluebox is backed by Andreessen Horowitz and Sun Microsystems co-founder Andy Bechtolsheim, and […]

Ubuntu Linux Phones Coming in 2014

The Ubuntu Phone is set to make its debut in 2014. In a phone press conference this morning, Mark Shuttleworth, founder of Canonical, the lead commercial sponsor of Ubuntu Linux, formally announced the company’s plans to launch phone hardware this year. Shuttleworth first announced his intention to bring the Ubuntu Linux operating system to phones […]

Belkin’s WeMo Connected Home Devices Vulnerable to Takeover: IOactive

As the number of Internet-connected devices, including those within the home, escalates, there are growing concerns about security risks. Security firm IOActive revealed Feb. 18 that it discovered multiple vulnerabilities in Belkin’s WeMo connected home devices. The WeMo devices—which include Internet-connected power and light switches that enable users to control their plugged-in devices over the […]

OpenStack Cloud Goes Open for Vendor Certification

The way that IT certifications have long worked is that they have largely been vendor-specific. That’s something that is about to change with the open-source OpenStack cloud platform. Rather than relying on vendor-specific certifications, a new effort being led by OpenStack vendor Mirantis is aiming to open-source certification for the cloud. The new effort is […]

RSA Conference Preview: Government Surveillance, SDN Among Key Topics

Every year, one of the biggest events on the information security calendar is the annual RSA Conference, and 2014 is no exception. On Feb. 11, analysts gathered for the annual pre-RSA conference call to discuss what’s likely to emerge as the big trends from the upcoming conference. Among the most contentious issues at the 2014 […]