Access Control News
Businesses Are Bad At Risk-Assessment, And That's Good For The Channel
5:45 PM EST Thu. Dec. 12, 2013
Solution providers with security practices say they are helping clients fine-tune their security programs by conducting effective risk assessments and engaging both business executives and IT leaders.
The 10 Coolest Security Startups Of 2013
4:00 PM EST Thu. Dec. 12, 2013
These emerging security industry companies are developing innovative technology to better secure cloud-based systems, eliminate passwords and analyze behavioral patterns to detect threats.
Dell Revamps Wireless Gear With Faster Speeds, Easier Management
12:01 AM EST Tue. Dec. 10, 2013
Dell's latest wireless move is aimed deep inside enterprise as it looks to bulk up its converged infrastructure and software-defined networking play.
CDW, World Wide Technology: Cloud Is An Opportunity Not A Threat
5:17 PM EST Mon. Dec. 09, 2013
Solution provider behemoths attending the Raymond James Supply Chain conference say the cloud is bringing good tidings to their companies.
5 Companies That Had a Rough Week
3:40 PM EST Fri. Dec. 06, 2013
For the week ending Dec. 6, CRN looks at IT companies that were unfortunate, unsuccessful or just didn't make good decisions.
5 Companies That Came To Win This Week
1:40 PM EST Fri. Dec. 06, 2013
For the week ending Dec. 6, CRN looks at IT companies that brought their 'A' game and made moves to beat out competitors.
NSA Revelations Prompt Microsoft To Bolster Cloud Encryption, Transparency
6:01 PM EST Thu. Dec. 05, 2013
Resellers and service providers say they have seen a significant increase in questions about data security and privacy protections of data residing in cloud-based systems.
Security VARs: 2 Million Stolen Passwords, 2 Million Reasons For Stricter Policies
12:15 PM EST Thu. Dec. 05, 2013
The discovery of a cache of stolen account credentials from more than 2 million accounts including Facebook, Twitter and Google is a reminder that businesses need to be vigilant about password management, say solution providers.
2013 Best Companies: By Technology
10:00 AM EST Fri. Nov. 29, 2013
CRN's third annual Best Companies To Partner With survey included a look at how vendors measured up by technology. Here's a look at the top scorers in each technology category.
Businesses Brace For Cyber-Monday Holiday Shopping Threats
5:36 PM EST Tue. Nov. 26, 2013
Website attacks can trip up ecommerce sales while spam and phishing campaigns can erode brand reputation, say experts. Solution providers tell clients to reassess basic security measures.
5 Companies That Had A Rough Week
2:21 PM EST Fri. Nov. 22, 2013
For the week ending Nov. 22, CRN looks at IT companies that were unfortunate, unsuccessful or just didn't make good decisions.
5 Ways To Keep Big Data From Going Bad
4:00 PM EST Thu. Nov. 21, 2013
Big data has potential societal benefits, but, left unchecked, the information could be used for nefarious purposes.
Phish Food For Thought: 10 Ways To Identify A Phishing Attack
10:00 AM EST Thu. Nov. 21, 2013
Phishing attacks will increase significantly over the next few months as attackers try to take advantage of online buyers during the holiday shopping season, security experts told CRN. Learn how to stop them with this guide.
SaaS Vendor Adallom Launches Cloud Security Auditing Services
6:27 PM EST Thu. Nov. 14, 2013
Israeli firm Adallom said its security software provides real time data security by monitoring activity in SaaS applications and blocking attempts to infiltrate data when it detects unusual user activity.
5 Obamacare Website Failures That Could Have Been Avoided
10:00 AM EST Mon. Nov. 04, 2013
An update to a longstanding study of software security activities at dozens of leading organizations found similarities in their approach that can be applied to any business seeking security improvements, including those helping to fix the glitch-riddled Obamacare site.
5 Companies That Had A Rough Week
2:08 PM EST Fri. Nov. 01, 2013
For the week ending Nov. 1, CRN looks at IT companies that were unfortunate, unsuccessful or just didn't make good decisions.
Salesforce.com Launches 'Private' Version Of AppExchange For Enterprises
8:14 PM EST Thu. Oct. 31, 2013
Salesforce updates its AppExchange product with a version that's tailored specifically for the security and management needs of control-focused enterprise IT departments.
MongoHQ Shores Up Its Defenses After Data Breach
10:28 AM EST Thu. Oct. 31, 2013
The database hosting provider, which was founded in 2011, very likely lacked a strong security program with password management policies and other controls to protect access over critical applications, experts say.
Leaked NSA Documents Uncover Tap Into Yahoo, Google Networks
3:59 PM EST Wed. Oct. 30, 2013
The latest leaked documents from NSA whistleblower Edward Snowden shows a secret effort by the NSA and its British counterpart Government Communications Headquarters to intercept data flowing between the data centers maintained by Yahoo and Google globally.
Phony Antivirus Software Pushers Have New Trick Up Their Sleeve
12:25 PM EST Wed. Oct. 30, 2013
ThreatTrack Security researchers find that attackers are using stolen digital certificates, which make malware look legitimate and can dupe antivirus detection engines.
Mobile Security Deployments Increase But Lack BYOD Policies: Study
7:01 PM EST Mon. Oct. 21, 2013
A survey of chief information security officers found mobile device management capabilities the No. 1 most recently deployed technology in the past 12 months. But, most firms are lacking policies that address personal devices, according to a new study.
Crime Doesn't Pay: 10 Ways To Control And Reduce Cybercrime Costs
2:00 PM EST Tue. Oct. 15, 2013
These security technologies and strategies, identified by the Ponemon Institute, are being implemented at businesses to reduce the risk of a data breach and also rein in cybercrime costs, which have increased significantly in recent years.
NAC Vendors Have The Endpoint In Sight
11:50 AM EST Tue. Oct. 15, 2013
Network access control vendors such as ForeScout are working with security vendors to boost the visibility of endpoint devices attempting to connect to the network.
ITIF Pushes For NSA Transparency Amid New 'Crypto War'
5:19 PM EST Thu. Oct. 10, 2013
The Information Technology and Innovation Foundation says the crypto wars of the 1990s between the government and the private sector are raging again, thanks to the NSA's encryption cracking program.
RSA: New Technology Focus Means New Skill Sets For Partners
11:32 AM EST Thu. Oct. 10, 2013
RSA puts hardware tokens in the rearview mirror as it analyzes partners' expertise and prepares them for the new 'forensics mentality.'
CHANNEL SERVICES >>