Menu

Stories by Ellen Messmer

Most websites are "One Day Wonders" -- and that's worrisome

The Internet's seething Web of content resembles endless bubbles popping to the surface for only a day, then vanishing, a security study from Blue Coat Systems released today indicates. That means there are a huge number of new, unknown and transient sites daily, posing challenges to determine whether they are benign, or should be blocked as dangerous.

Written by Ellen Messmer26 Aug. 14 22:48

Homeland Security wants corporate board of directors more involved in cyber-security

Setting corporate cyber-security policy and taking actions around it must be a top concern for the board of directors at any company, not just the information-technology division, the Department of Homeland Security (DHS) indicated as a high-level official there backed a private-sector effort to raise awareness at the board level.

Written by Ellen Messmer30 July 14 06:06

Is Bring Your Own Identity a security risk or advantage?

The "Bring Your Own Identity" (BYOID) trend in which websites let users authenticate using identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo or other means raises some questions in the minds of IT and business managers. And a survey conducted by Ponemon Institute shows a vast difference in how the IT and business sides think about this so-called BYOID method of authentication.

Written by Ellen Messmer29 July 14 04:51

Gartner: Best practices for Amazon AWS security

The Amazon AWS cloud service is fine for enterprise workloads and applying security controls such as encryption and firewalls is possible, though more security vendors need to step up to support Amazon's EC2 service, according to the Gartner analysis presented today.

Written by Ellen Messmer26 June 14 06:08

Gartner: Top trends in IT security technology

Gartner has kicked off its annual Gartner Security and Risk Management Summit 2014 in National Harbor, Maryland, by pointing to the top threat challenges heading into next year -- and added that in the future, the term IT security will give way to "digital security" to encompass newer challenges, such as the Internet of Things.

Written by Ellen Messmer24 June 14 05:03

Heartbleed was a headache, but far from fatal

It's been a month since the Heartbleed Bug set off a stampede to patch software in everything from network gear to security software as it quickly became evident that vulnerable versions of the OpenSSL encryption code had been very widely deployed.

Written by Ellen Messmer09 May 14 07:11

Data breaches 9% more costly in 2013 than year before

It cost U.S. companies hit by data breaches last year an average of $5.4 million to cope with the after-effects – up 9% from the year before, according to the ninth annual Ponemon Institute study published Monday.

Written by Ellen Messmer05 May 14 15:04

Android-based malware: the good, the bad and the ugly

When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover.

Written by Ellen Messmer05 March 14 06:44

Chinese government still sponsoring cyber-espionage, says FireEye COO

A year ago, Mandiant, since acquired by FireEye, issued a long report called "APT1" that accused China's People's Liberation Army of launching cyber-espionage attacks against 141 companies in 20 industries through a group known as "PLA Unit 61398" operating mainly from Shanghai.

Written by Ellen Messmer28 Feb. 14 19:28