HomeCybersecurity

Cybersecurity

Protecting Identity

Theres a lot of work still to be done in defining the rules of stewardship for digital identities. We agree with the San Francisco...

A Good Judge of Character

I cant define "suspicious traffic," but I know it when I see it. Unfortunately, this human test—with apologies to the late Justice Potter Stewart,...

ISS Brings in New VP of Channel Program

Internet Security Systems, which has had a reputation in the industry for testy relations with its resellers, has hired a new vice president of...

Anti-Spyware Hones Searches

In the long run, at least, eWEEK Labs believes that anti-spyware defenses are an appropriate and logical component of anti-virus security suites. Integrating spyware...

Microsoft Moves on Security

Citing increased threats from spyware and rootkits, Microsoft Corp. last week unveiled a new enterprise security product called Microsoft Client Protection and a security...

Symantec to Acquire BindView

Symantec Corp. continued its recent run of acquisitions last week, announcing plans to buy BindView Development Corp., of Houston, for $209 million, or $4...

SSL VPN Targets SMBs

Watchguard Technologies Inc.s Firebox SSL Core with Citrix Systems Inc.s Citrix Secure Access is a good Secure Sockets Layer VPN solution for small and...

eBay, VeriSign Strike Online Payment Deal

Online auctioneer eBay Inc. announced Monday that it plans to buy VeriSign Inc.s payment gateway business for $370 million, as it looks to further...

Careless Users Challenge Mobile Security

CHICAGO—The primary security threat posed today by the surge in corporate use of mobile devices is not malware, industry pros said here Monday, pointing...

SenSage Bolsters Compliance, Event Monitoring

SenSage Inc.s upgraded information management platform features extended clustering capabilities and boosted analytics to improve event data management and help users eliminate compliance woes. SenSage...