Transporter network storage device cuts cost with bring-your-own-drive option

Cloud storage and back-up services like Dropbox and Carbonite deliver the convenience of anywhere access and the security of offsite backup, but the subscription fees for those services add up. Network-attached storage systems like WD’s new My Cloud are attractive alternatives, but it’s not always easy to sync two of those systems over the Internet to provide […]

Software secures and audits privileged accounts on Unix-based systems

Cyber-Ark Software has released its new SSH Proxy solution that secures, audits, and reports on all privileged SSH activity in UNIX environments. The new solution, available as part of Cyber-Ark’s Privileged Session Management (PSM) suite, monitors and records command-level activity, protects against malware-based attacks and provides real-time intelligence on malicious activity without changing SSH session […]

Microsoft report details risks of running unsupported software

A new report from Microsoft Corp. reveals the security risk that consumers and businesses face when using unsupported operating systems and software. The company’s Security Intelligence Report volume 15 found that in the first half of 2013, nearly 17 percent of computers worldwide running up-to-date, real-time security products from Microsoft encountered malware. Although Windows 8 […]

Gigamon announces new vision for software-defined network monitoring

Gigamon announces its new vision for software-defined monitoring based on a four-layer architecture. Gigamon’s strategy is to develop a unified Visibility Fabric architecture that would ultimately deliver orchestrated visibility across physical, virtual and software-defined networks (SDN). This approach will build on Gigamon’s existing architecture and the principles of SDN to provide a centralized, programmable approach […]

Spam, mobile, APT campaigns top attacks in Asia-Pacific

Spam, mobile, and Advanced Persistent Threats (APTs) have been listed as top security risks in Asia-Pacific.   According to Trend Micro Inc.’s latest security roundup report, there is a significant shift from “smash-and-grab incidents” used to be favored by cybercriminals to long-term, ongoing targeted attacks that often leverage social engineering and malware.   “Asia is […]