User activity monitoring answers the age-old questions of who, what and when

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

User activity monitoring answers the age-old questions of who, what and when


User activity monitoring answers the age-old questions of who, what and when

Posted: 19 Nov 2010 08:00 AM PST


The city of Richmond, Va., had a user access problem. Due to an inadvertent misconfiguration of Active Directory, internal users were able to access systems and databases that they shouldn't have had access to. A user activity monitoring tool helped the city see the inappropriate access and lock down their systems.

52 percent of firms have no IT security guidelines for staff

Posted: 19 Nov 2010 08:00 AM PST


More than half of small firms (52 percent) have no IT security guidelines in place for staff, meaning staff could be putting the firm at risk by downloading or visiting potentially dangerous websites from company PCs, says AVG.

Google fixes Street View as German launch continues

Posted: 19 Nov 2010 08:00 AM PST


Google released Street View imagery for 20 more German cities on Friday, saying it has improved the process used to blur the properties of those who object to the service.

Adobe Reader X Makes PDF Files Safer

Posted: 19 Nov 2010 08:00 AM PST


Adobe Reader X is here. Adobe announced earlier this year that it was working on a more secure version of its ubiquitous PDF reading software, Adobe Reader. The new version includes Protected Mode, a sandboxing security control designed to prevent malware exploits against the application.

Intellect calls for private, public cybersecurity deal

Posted: 19 Nov 2010 08:00 AM PST


Technology trade body Intellect has called for an effective cyber security partnership between industry and government.

Adobe launches 'sandboxed' Reader X

Posted: 19 Nov 2010 08:00 AM PST


Adobe today released Reader X, the next version of its popular software that includes a "sandbox" designed to protect users from PDF attacks.

Wiseguy scalpers bought tickets with CAPTCHA-busting botnet

Posted: 19 Nov 2010 08:00 AM PST


Three California men have pleaded guilty charges they built a network of CAPTCHA-solving computers that flooded online ticket vendors and snatched up the very best seats for Bruce Springsteen concerts, Broadway productions and even TV tapings of Dancing with the Stars.

Apple patches critical 'drive-by' Safari bugs

Posted: 18 Nov 2010 08:00 AM PST


Apple today patched 27 vulnerabilities in Safari for Mac OS X and Windows, 85% of them critical bugs that could be exploited to hijack Macs or PCs.

Watch Your Back! Snoopers are After Your Data

Posted: 18 Nov 2010 08:00 AM PST


Next time you're sitting at your neighborhood Starbucks surfing the Web and you get that sense that somebody is watching you--take heed. They probably are. Using a computer in public comes with the added risk that those nearby may be able to glean sensitive information by casually viewing your display over your shoulder.

Too much access? Privileged Identity Management can help

Posted: 18 Nov 2010 08:00 AM PST


Privileged identity management (PIM) products automate control over administrative accounts, which typically put too much power in too many people's hands with too little accountability. They address the security, operational and compliance issues posed by the widely shared administrative accounts and passwords, excessive administrative rights, poor separation of duties, embedded passwords in legacy applications and scripts, and poor or nonexistent privileged-password rotation. They also provide individual accountability and an audit trail to prove that policies and controls are actually being enforced.

China Hijack Raises Concerns for Internet Security

Posted: 18 Nov 2010 08:00 AM PST


Reports have emerged about an event earlier this year when much of the Internet traffic from around the world was temporarily hijacked--rerouted through China Telecom. China Telecom claims the incident was an accident, but regardless of intent it demonstrates that the Internet itself can be hijacked, and raises concerns over how to prevent future occurrences.

Juniper ends busy week by acquiring video storage assets

Posted: 18 Nov 2010 08:00 AM PST


Juniper acquires Internet video and storage technology assets from BlackWave, days after snapping up WLAN company Trapeze Networks.

Smartphone and iPad-crazy enterprises playing right into Aruba Networks' hands

Posted: 18 Nov 2010 08:00 AM PST


The influx of smartphones, tablets and other wireless devices into businesses is making many employees more productive, but Aruba Networks is seeing firsthand how much strain all of this newfound mobility is putting on the enterprise IT and security staffs that are its customers.  In this installment of the IDG Enterprise CEO Interview Series, IDGE Chief Content Officer John Gallant spoke with Aruba CEO Dominic Orr about the changing wired/wireless network architecture, competing with Cisco Systems, exploiting the cloud and the rise of 802.11n.

0 comments:

Post a Comment