unified threat management (UTM)

Data security: is breach mitigation all that's left?
security on computer
Security

Data security: is breach mitigation all that's left?

If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the…
30 Jul 2012
Cryptzone calls for cyber security to be taught in schools
Training
Security

Cryptzone calls for cyber security to be taught in schools

Security vendor wants to see IT security education included in the National Curriculum.
16 Jul 2012
Fortinet FortiGate 3140B review
Fortinet FortiGate 3140B
Network & Internet

Fortinet FortiGate 3140B review

The FortiGate 3140B is a feature-laden UTM appliance which comes with a 64GB SSD, 10GbE port and an average throughput of 8.2Gbps.
13 Jun 2012
Gartner: Worldwide UTM revenues top $1bn
Graph
Security

Gartner: Worldwide UTM revenues top $1bn

Analyst hails firewall refresh cycles and growing interest from SMB and mid-sized firms for market growth.
23 Apr 2012
IBM Pulse 2012: IBM and Toshiba unveil power-savvy business
IBM Pulse logo
Laptops

IBM Pulse 2012: IBM and Toshiba unveil power-savvy business

The two tech giants have worked together to create new software to aid power management and security. It'll be included in Toshiba's next-gen enterpri…
6 Mar 2012
RSA's Art Coviello: Security industry going through hell
Security hell
Security

RSA's Art Coviello: Security industry going through hell

A year after the hack on RSA, Art Coviello says the entire security industry has been going through 'hell.'
28 Feb 2012
IBM builds on Q1 Labs acquisition with QRadar boost
Security
Security

IBM builds on Q1 Labs acquisition with QRadar boost

Big Blue launches an updated version of the QRadar SIEM software it acquired after buying Q1 Labs last year.
22 Feb 2012
Software industry slammed for poor patching practice
Vulnerability
Security

Software industry slammed for poor patching practice

Companies are still producing plenty of insecure software, as end-point vulnerabilities triple.
14 Feb 2012
ISF: Businesses need 'cyber resiliency'
Data protection
Security

ISF: Businesses need 'cyber resiliency'

There are some attacks companies won't be able to protect themselves from, so drawing up a resiliency strategy is essential, the ISF says.
24 Jan 2012
Symantec: 2006 hack leaked source code
Symantec
Security

Symantec: 2006 hack leaked source code

The security giant publicly discloses a breach of its network - almost six years after it took place.
18 Jan 2012
New Mac malware spikes in 2011
Mac
Security

New Mac malware spikes in 2011

F-Secure finds new Mac malware spikes in 2011, when compared to other years at least.
17 Jan 2012
Oracle issues 78 vulnerability patches
Oracle
Security

Oracle issues 78 vulnerability patches

Combined with Microsoft and Adobe patches, Oracle has made IT departments' lives a little harder this month.
17 Jan 2012
Amazon-owned retailer Zappos.com hacked
Hacker
Security

Amazon-owned retailer Zappos.com hacked

Up to 24 million customers are affected in one of the bigger hacks of the past 12 months.
16 Jan 2012
Microsoft and Adobe plan busy January patch days
Patch Tuesday
Security

Microsoft and Adobe plan busy January patch days

IT departments will have a busy month of patching to kick off 2012.
9 Jan 2012
Shipping sector security awareness 'low to non-existent'
Shipping
Security

Shipping sector security awareness 'low to non-existent'

ENISA urges EU member states to improve security awareness in the maritime sector.
20 Dec 2011
Government publishes cyber security strategy
cyber crime
Security

Government publishes cyber security strategy

Government sets out plans to strengthen national defences over the next four years.
25 Nov 2011
Business of IT: Building a business case for security
computer security
Security

Business of IT: Building a business case for security

Security can be both the unseen hero and the weakest link in an organisation, so how do you make the case to spend enough to protect your organisation…
9 Nov 2011
Business of IT: Building a business case for security
computer security
Security

Business of IT: Building a business case for security

Security can be both the unseen hero and the weakest link in an organisation, so how do you make the case to spend enough to protect your organisation…
9 Nov 2011
Mac OS X Lion password-changing flaw uncovered
Password
unified threat management (UTM)

Mac OS X Lion password-changing flaw uncovered

Changing passwords looks awfully simple for anyone who has acquired access to a Mac OS X Lion machine.
20 Sep 2011
Netgear ProSecure UTM150
The Netgear ProSecure UTM150
Security

Netgear ProSecure UTM150

Netgear is better known for its network routers and switches than its security appliances. Karl Wright takes a look under the hood of the ProSecure UT…
9 Sep 2011
Which? says Nationwide is safest online bank
Bank security
Security

Which? says Nationwide is safest online bank

Nationwide scores highly, but no bank is able to protect from all forms of fraud.
19 Aug 2011
Malicous spam hits ‘epic’ levels
Spam
Security

Malicous spam hits ‘epic’ levels

This month has seen a serious rise in malicious spam, according to M86 data.
17 Aug 2011
Three phishers jailed for bank attacks
Go to jail
unified threat management (UTM)

Three phishers jailed for bank attacks

A PCeU investigation leads to the downfall of three men involved in phishing scams.
12 Jul 2011
Panda risks labelling LulzSec stupid
Hacker
unified threat management (UTM)

Panda risks labelling LulzSec stupid

Blasting hacktivist groups can backfire, but that hasn't stopped Panda Security having a pop at LulzSec and Anonymous.
6 Jul 2011