Check Point Made The Right Move In Dropping Sourcefire Bid
The fastest way to obscurity in the security market is to worry about yesterday's problems. Check Point Software Technologies is looking to put its aborted bid to buy Sourcefire behind it. Once the deal came under the scrutiny of the Committee on Foreign Investment in the United States, both companies would have been wrapped up in red tape for months. Unacceptable in the fast-moving world of IT security.
When It Comes To Data, We Just Still Don't Get It
This whole information mismanagement thing is really starting to concern me. If we're to draw conclusions from recent developments, we, the nation that has mastered the art of creating an information economy while shipping most of the actual production of real goods overseas, appear to have no idea what we're doing with electronic data.
Data Security: Out To Lunch, Er, Dinner
It was just last week that InformationWeek published the latest exhaustive analysis of what's emerging as the IT story of the first decade of this century: complete corporate and government ineptitude when it comes to managing sensitive personal data.
Confessions Of An Adware Purveyor
York Baur acknowledges that 180solutions' original approach to spreading adware among the Internet masses wasn't properly executed by the company. "Lots of criticisms have been levied against 180, but I think the only valid criticism was that we were perhaps naïve about the world of Web publishing earlier on in our history, and it has taken us through 2005 to truly take control of that ownership of that network and get practices that we think are poor cleaned up," says Baur, 180solutions' e
Finger-Pointing Abounds As Customers Are Fleeced
In June, Frank Robertson could be sentenced to spend the next 15 years in a New Jersey state prison as punishment for his role in one of the biggest payment-card frauds pulled off to date. Robertson and 13 other men were arrested in December in connection with a heist that stretches across the U.S. and into Eastern Europe, with more than $3 million in goods stolen along the way, mostly high-end electronics. The repercussions of this crime will ripple throughout the financial services, retail, an
The War On Malware Goes Mobile
Remember the good old days, when your only concern about issuing and managing cell phones and PDAs was that someone would leave theirs in a taxi or on an airplane? Now viruses and mobile malware have reared their ugly heads, further convincing IT departments that BlackBerrys, cell phones, laptops, and PDAs must be locked down with as much vigor as back-end systems. The result is a slew of mobile data security options that include mobile encryption and even a kill switch for data should it fall i
If You Can't Trust Your Bank, Who Can You Trust?
You're traveling out of the country, for business or on vacation, and you decide it's time for lunch. You're about to hail a taxi to take you to that fantastic café you passed by this morning, but first you figure you might was well get some cash. No problem, there's even a branch of your local bank nearby. Well, maybe there is a problem. The ATM refuses to give you any money, informing you that your transaction cannot be completed and you should call your bank. You pull out your cell phone