Threat Management News
-
Adobe Source Code Leak Could Trigger New Dangers, Say Experts
5:17 PM EST Fri. Oct. 04, 2013
Hackers can use the source code to hunt for vulnerabilities in widely used Adobe software and create zero-day attacks targeting specific firms or conduct campaigns on a broad scale. -
Adobe Addressing Massive Data Breach, Source Code Leak
10:42 AM EST Fri. Oct. 04, 2013
A data security breach at Adobe results in the exposure of personal information, including encrypted credit card numbers of 2.9 million people, and the potentially damaging source code lead. -
Palo Alto Networks Partners See Big Sales Gains For 2014
12:31 PM EST Thu. Oct. 03, 2013
Of the 150 top-tier Palo Alto Americas partners attending the company's fourth annual conference this week, 141 have doubled their sales in the past year and see only good times ahead. -
Government Shutdown? Obamacare? Here Come The Spammers
11:00 AM EST Thu. Oct. 03, 2013
Spam campaigns use high-profile events to lure victims to sham websites, trying to trick users into giving up their personal information, say experts. -
Accuvant Solutions Architect Talks Up McAfee's Free Threat Analysis Tools
10:38 AM EST Thu. Oct. 03, 2013
McAfee's appliances can help bolster an intrusion prevention system and aid threat analysts in detecting and investigating suspicious activity on the network, says a security solution provider architect. -
McAfee Partner Summit: 10 Ways McAfee Executives Engaged Channel Partners
4:00 PM EST Wed. Oct. 02, 2013
Partners were given an overview of McAfee's product road map, a review of challenges and achievements over the last year, and the goals expected of partners over the next year, at the 2013 McAfee SecurityAlliance Partner Summit. -
McAfee President On Competition And Changing Perceptions
1:36 PM EST Wed. Oct. 02, 2013
McAfee's Mike DeCesare tells partners which companies keep him up at night and what he's doing to make sure the company is known for more than its antivirus products. -
McAfee Emboldens Channel With 'Hot' Growth Opportunities, New Incentives
5:00 PM EST Tue. Oct. 01, 2013
McAfee channel executives tell partners that certain technology areas are prime for profitable growth, including security information event management, advanced threat detection and next-generation firewalls. -
Experian Buys 41st Parameter For Web Fraud Detection
11:35 AM EST Tue. Oct. 01, 2013
Experian's purchase of 41st Parameter is a continuation of the rapid move by larger vendors to invest in technologies that can detect fraud without impacting customers, say analysts. -
New LogRhythm Channel Chief Nancy Reynolds On 'Embracing' Indirect Model
11:05 AM EST Tue. Oct. 01, 2013
Reynolds says she is talking to partners to determine 'where the shortcomings are and fix them' as LogRhythm hopes to attract solution providers with network security expertise. -
Symantec CFO Steps Down
10:15 AM EST Tue. Oct. 01, 2013
Symantec's CFO steps down as the company undergoes a complete reorganization of its product portfolio and go-to-market channel strategy. -
Palo Alto Picks Up Partner Pace With Worldwide Channel Chief Appointment
7:37 PM EST Mon. Sep. 30, 2013
A 15-year channel veteran and former senior vice president of global channels for videoconferencing vendor Polycom is taking the worldwide channel job at fast-growing Palo Alto Networks. -
Cloud Concerns: Today, Data Security Should Trump Worker Productivity
9:40 AM EST Mon. Sep. 30, 2013
A new Skyhigh Networks study reveals that too many companies are focused on 'yesterday's concerns.' The NSA revelations mean they better get with the times. -
NSA Revelations Rattle The Cloud Market: What Are You Doing To Calm Customers' Fears?
9:00 AM EST Mon. Sep. 30, 2013
Companies are asking more questions about the security of their cloud-based data as the barrage of NSA-related news rains down. For solution providers, being a 'trusted adviser' has never been more important. -
Desk Stop: Top 5 Cloud Services Employees Can't Access
5:00 PM EST Fri. Sep. 27, 2013
Risky business? Maybe, maybe not. Here are the top five services that companies are preventing their employees from accessing, according to a Skyhigh Networks study. -
Cisco, McAfee, Other Firms Addressing NSA-Linked Encryption Algorithm
3:33 PM EST Fri. Sep. 27, 2013
Security firms and network device makers that are validated to run a contentious encryption algorithm are addressing customer concerns and considering whether to follow RSA in issuing a formal advisory to customers. -
Many Popular WordPress Sites Vulnerable To Attack, Study Finds
11:10 AM EST Fri. Sep. 27, 2013
A review of thousands of popular WordPress websites found more than 70 percent of them vulnerable to attack. Website administrators are using outdated and vulnerable versions of the platform, making them easy targets of cybercriminals, according to the study. -
Top 5 Zero-Day Threats Of 2013
4:00 PM EST Thu. Sep. 26, 2013
Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective. -
New Kaspersky Research: Just Call Them 'Cybermercenaries'
10:10 AM EST Thu. Sep. 26, 2013
Latest Kaspersky analysis finds hit-and-run attacks targeting government contractors, shipbuilding groups, telecom operators and high-tech manufacturers in Japan and South Korea. -
IBM's X-Force Team: Attackers Take Path Of Least Resistance
10:30 AM EST Wed. Sep. 25, 2013
Targeted attack campaigns are using tried-and-true hacking techniques, including SQL injection, cross-site scripting and more, says a new report from IBM's X-Force Team. -
F-Secure: Phishing Campaigns Using Real Estate, Tax Agencies As Bait
10:05 AM EST Tue. Sep. 24, 2013
Automated toolkits are helping cybercriminals craft socially engineered messages that are easily tricking victims into visiting an attack website. -
5 Reasons FireEye Antimalware Technology Is Overvalued By Wall Street
10:00 AM EST Tue. Sep. 24, 2013
FireEye is one of the hottest appliance makers in the security industry, but other security vendors are reproducing its antimalware technology and the value of the protection it provides is unproven, experts tell CRN. -
Microsoft Zero-Day Attacks Tied To Group Responsible For Bit9 Breach
11:15 AM EST Mon. Sep. 23, 2013
An ongoing attack campaign is targeting organizations in Japan, according to new research from FireEye that ties cybercriminals responsible for the latest attacks to the high-profile data breach at Bit9. -
RSA Tells Developers To Ditch Contentious Encryption Algorithm
11:40 AM EST Fri. Sep. 20, 2013
An encryption algorithm that may contain a back door for government surveillance was set as the default configuration in RSA's encryption implementation toolkit for developers. -
5 Ways To Avoid An Epic Facebook Fail
3:27 PM EST Thu. Sep. 19, 2013
Montana Lt. Governor John Walsh, who is running for the state's U.S. Senate seat, faced scrutiny this week for 'liking' a Facebook page that features pictures of women's breasts. The rogue 'like' was called an honest mistake, but it could be costly to his campaign. Learn how to avoid reputation-damaging mistakes.
CRN Vault
CRN's 30th AnniversaryIn our special report, we reflect on the changes in technology and take a trip down memory lane as we reminisce on the companies and personalities that shaped the industry over the past three decades.
CHANNEL SERVICES >>
| • |
| • |
| • |
| • |
| • |
| • |
| • |
|
|

