Artikel zum Thema "Security" bei CIO.de

Security Manager's Journal: Security flaw shakes faith in Apple mobile devices

Last July, I wrote about serious security vulnerabilities on the Android operating system for mobile devices, which could compromise data as well as the devices themselves, and how this led me to believe Apple phones and tablets were a better choice because they did not have the same underlying security flaws. Sadly, as with all "Apple is more secure" claims, that has proved false. » zum Artikel

Norton Internet Security 2014: Polished security suite with excellent protection

Norton Internet Security 2014 ($80 for one year of protection on up to three PCs) looks great--and it offers excellent protection against all threats. Internet Security 2014 also provides mobile security, comprehensive parental controls, and system insights, so advanced users can track their PCs' performance. But Symantec's suite isn't perfect: Its menus, settings, and features are geared a little ... » zum Artikel

Avast Internet Security (2014): short on security

Avast is a company perhaps best known for its free antivirus software. But paying for Avast Internet Security 2014 ($40 for one year of protection on one PC) will get you such premium features as a robust firewall, online banking security, and phishing and scam email protection. » zum Artikel

So machen Sie Ihr Android-Gerät sicherer

App Ops Starter, Mobile Sandbox, Sophos AV: So machen Sie Ihr Android-Gerät sicherer (Foto: Android)
App Ops Starter, Mobile Sandbox, Sophos AV: Vielen Anwender ist es immer noch nicht klar: Mobiltelefone sind heute komplette Computer - mit allen Vorteilen und Gefahren. Wir zeigen Ihnen, was Sie zum Schutz Ihres Android-Smartphones tun können. » zum Artikel
  • Frank-Michael Schlede
  • Thomas Bär

Juniper: Quick look at security strategy behind its SDN controller security

Juniper Networks in September made its software-defined network (SDN) controller known as Contrail generally available. Network World Senior Editor Ellen Messmer delves into the security strategy behind the Contrail controller in a discussion with Juniper's Senior Director of Product Management Jennifer Linn, and Chris Hoff, vice president of strategic planning in the security business unit at Juniper. » zum Artikel

Cloud Security Alliance offers ultra-high cloud security plan

Orlando -- The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies. » zum Artikel

IT security pros often seen as 'innovation killers,' says ADP's IT security chief

Orlando -- The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security. » zum Artikel

Die besten Hersteller und Distributoren

ITK-Channel: Die besten Hersteller und Distributoren (Foto: Channelpartner)
ITK-Channel: Die besten Hersteller und Distributoren des deutschen ITK-Channels hat unsere Schwestermedienmarke ChannelPartner in Zusammenarbeit mit der GfK mit den Channel Excellence Awards 2014 ausgezeichnet. » zum Artikel
  • Armin Weiler

Security Manager's Journal: Time to tweak the security policies

Every fall, I conduct a policy review. I think it's a good idea to have this on my calendar, because no policy, no matter how well crafted, is meant to last for all time. New standards arise and old ones are modified, making some policies deficient. Or a security incident, an audit or some business reality that was previously unacknowledged emerges to demonstrate how a policy falls short. » zum Artikel

The greatest security story never told -- how Microsoft's SDL saved Windows

The story, "The greatest security story never told -- how Microsoft's SDL saved Windows," posted on the wire Friday, incorrectly spelled out the term "SDL" in the first paragraph. The correct rendering is Security Development Lifecycle. The first paragraph has been corrected on the wire and now reads: » zum Artikel

Loughborough University deploys new network security to enable greater data throughput

Loughborough University is deploying a new network security platform to enable greater data throughput and meet students' internet access demands. » zum Artikel

A clear-eyed guide to Mac OS X's actual security risks

Apple's Mac computers and its OS X operating system have enjoyed a reputation of being relatively secure over the years. But in fact, experts say, the Apple OS has had security issues that might have been downplayed only because the vulnerabilities were not exploited. » zum Artikel

Snowden advocates at SXSW for improved data security

Encryption technologies can be a powerful tool against government surveillance, but the most effective techniques are still largely out of reach to the average Internet user, Edward Snowden said Monday. » zum Artikel

Security Manager's Journal: Thousands of dollars in phone calls Management hates that.

As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorized access. I deal with them all as they arise, and they do keep things interesting. » zum Artikel

Virtual machine (VM) security still a work in progress

Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions. » zum Artikel

Perspective: Microsoft risks security reputation ruin by retiring XP

A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security into software, and began building what has become an unmatched reputation in how a vendor writes more secure code, keeps customers informed about security issues, and backs that up with regular patches. » zum Artikel

SXSW starts out with spotlight on security, as Google's Schmidt sounds off on NSA

Austin, Texas is in full-on party mode as South by Southwest kicks off Friday, but the normally lighthearted Interactive portion of the festival--best known for turning Twitter and Foursquare into stars--is taking a serious turn this year by addressing the National Security Agency's PRISM program head-on. » zum Artikel

(ISC)2 appoints new head to expand security qualifications beyond US

Security organisation (ISC)2 has appointed Adrian Davis as its new EMEA managing director to expand the body's work in developing certfication programmes within the region, it has been announced. » zum Artikel

Commonwealth pact to encourage collaboration on African online security

The Commonwealth Cybergovernance Model adopted by ICT ministers from the 53-country Commonwealth of Nations this week could encourage African nations to move forward on controversial proposals to combat cybercrime and develop common guidelines for developing the tech sector on the continent. » zum Artikel

The greatest security story never told -- how Microsoft's SDL saved Windows

Microsoft has launched a new website to "tell the untold story" of something it believes changed the history of Windows security and indeed Microsoft itself - the Software Development Lifecycle or plain 'SDL' for short. » zum Artikel

Apple reveals unprecedented details in iOS security

An updated Apple whitepaper on iOS security delves into an unprecedented amount of detail about the security architecture and features of the company's mobile OS for devices such as the iPhone and iPad. Security professionals and IT consultants are praising both the company's transparency and its approach to protecting iOS devices, Internet security and users' data. » zum Artikel

VMware spotlights key NSX security tool for deploying security software and services

San Francisco -- VMware's NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines. » zum Artikel

Major security flaw threatens Linux users

A source code mistake in the GnuTLS library an open-source software building block used in a large number of different Linux distributions to handle secure Internet connections could prove a serious threat to the privacy of Linux users, as developers rush to patch the vulnerability. » zum Artikel

CIOs Must Look to Adaptive Security Systems in Face of Evolving Threats

WASHINGTON - Federal CIOs, who consistently list cybersecurity as one of their top concerns, aren't likely to sleep any better after listening to Dave Aucsmith. » zum Artikel

Career advice: Moving into Internet security

Stuart Kippelman, CIO at Covanta Energy Ask a Premier 100 IT LeaderStuart Kippelman Title: Vice president and CIOCompany: Covanta Energy » zum Artikel

Non-Microsoft security flaws cause biggest headache, says Secunia

Three quarters of Windows security vulnerabilities in 2013 were connected to non-Microsoft programs that often lack adequate patching mechanisms, an analysis by security firm Secunia has found. » zum Artikel

The risk of offshoring security

Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive. » zum Artikel

Digital economy protected by online security: Fortinet

The security industry is ensuring the Australian digital economy continues to grow, according to Fortinet. » zum Artikel

Why you need to segment your network for security

My job over the last thirteen years as a penetration tester has given me a unique understanding of security from an attacker's point of view. I have conducted hundreds of penetration tests on organizations ranging from Federal government nuclear weapons labs, to banks, city governments, and practically everything in between. I know what makes an attacker's job easy, and what makes it difficult or ... » zum Artikel

China's Windows XP users to still get security support

Microsoft is making a special exception in the way it retires Windows XP in China, and will continue offering security support for the OS to users in the nation. » zum Artikel


Artikel zum Thema "Security" im IDG-Netzwerk
 

Vielen Anwender ist es immer noch nicht klar: Mobiltelefone sind heute komplette Computer - mit allen Vorteilen und Gefahren. Wir zeigen Ihnen, was Sie zum Schutz Ihres Android-Smartphones tun können.
Last July, I wrote about serious security vulnerabilities on the Android operating system for mobile devices, which could compromise data as well as the devices themselves, and how this led me to believe Apple phones and tablets were a better choice because they did not have the same underlying security flaws. Sadly, as with all "Apple is more secure" claims, that has proved false.
Vielen Anwender ist es immer noch nicht klar: Mobiltelefone sind heute komplette Computer – mit allen Vorteilen und Gefahren. Wir zeigen Ihnen, was Sie zum Schutz eines Android-Smartphones tun können.