HomeCybersecurity

Cybersecurity

IT Buyers Need New Purchasing Model

The IT industry has spawned more than its share of celebrity executives. Now IT has borrowed a celebrity from the world of entertainment, heiress...

Spyware Fracas Heats Up

There have been a few interesting stories percolating in the spyware/anti-spyware arena during the last few weeks. We had three anti-spyware vendors drop out...

Easier PCs Hinge on Better Security

One could argue that technology has come a long way. PCs are cheaper and faster than ever, with more memory and storage capacity than...

War Against Phishing Continues

Phishers and other online scammers are well ahead of law enforcement officials and security experts right now in terms of techniques and tactics, but...

Homeland Security Vacancies Strain Agenda

The power vacuum atop the Department of Homeland Securitys cyber-security division is straining the DHS relationship with key private-sector allies and hampering government efforts...

SSL-Explorer Offers VPN Basics

Companies looking for the most affordable way to kick off an SSL VPN technology pilot project—or deploy basic service for a small number of...

Check Point Secures VPN

With Connectra 2.0, Check Point Software Technologies Ltd. leverages its vast experience securing networks, applications and client endpoints to provide the most comprehensive security...

Panda to Update, Reposition TruPrevent Security Software

BILBAO, Spain—In a series of wide-ranging discussions with eWEEK.com on Monday, Spanish security company Panda Software revealed its plans to update, reprice and reposition...

Lax Security in Software Hurts Vendors, Customers

Lawmakers and chief security officers are fed up with the lack of security in todays software products, and its up to vendors to change...

AOLs Terms of Service Update for AIM Raises Eyebrows

Editors Note: Since the posting of this story, AOL has clarified its terms of service for its AIM service, insisting the controversial privacy clause...