Quantcast
Channel: CSO Online - Stories by John Dix RSS feed
Browsing all 15 articles
Browse latest View live

Failure of Senate to pass Cybersecurity Act leaves us all at risk

The Senate failed to muster enough votes to pass the watered-down Cybersecurity Act of 2012 (S. 2105) earlier this month, which reminds me of the line by Col. Nathan R. Jessep in the movie "A Few Good...

View Article



The security game changes when the bad guys are backed by foreign governments

Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most...

View Article

These companies help with everything from BYOD to MPLS backup, security...

I get to meet a lot of interesting companies in my capacity here at Network World, some of them newcomers, some more established. Here's a roundup of a few that are addressing common problems.

View Article

Huawei too dangerous to do business with?

The controversy swirling around use of Huawei telecom gear raises some interesting questions about the global nature of business and the future of cyberwarfare.

View Article

Big Data the security answer?

The recent RSA conference in San Francisco was awash in talk of big data, but it was clear there was some disagreement about what people mean by big data and some outright skepticism about it being the...

View Article


Who has responsibility for Cloud security?

As more organisations leverage the Cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts.

View Article

Why don't risk management programs work?

When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network...

View Article

Cloud computing causing rethinking of disaster recovery

Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.

View Article


Capital letter 'S,' 'D,' 'N' will never happen: VMware exec

Rack and stack that network and then walk away and leave it alone. VMware's NSX technology will provide all the control necessary going forward, says Steve Mullaney, senior vice president and general...

View Article


New methods for addressing insider threats: A roundtable discussion

Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This...

View Article

Securing the virtual world

Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.

View Article

Early user of VMware NSX net virtualization tool extols fine grain controls

Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in...

View Article

Palo Alto says its new endpoint protection tool can stop the bad stuff in its...

The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor...

View Article


New England security group shares threat intelligence, strives to bolster...

The Advanced Cyber Security Center is a three year old organization with a bold mission to "bring together industry, university, and government organizations to address the most advanced cyber threats"...

View Article

How well does social engineering work? One test returned 150%

A conversation with a white hat hacker

View Article

Browsing all 15 articles
Browse latest View live


Latest Images