Slide Shows

McAfee Partner Summit: 10 Ways McAfee Executives Engaged Channel Partners

Partners were given an overview of McAfee's product road map, a review of challenges and achievements over the last year, and the goals expected of partners over the next year, at the 2013 McAfee SecurityAlliance Partner Summit.
[Oct 02, 2013]

Desk Stop: Top 5 Cloud Services Employees Can't Access

Risky business? Maybe, maybe not. Here are the top five services that companies are preventing their employees from accessing, according to a Skyhigh Networks study.
[Sep 27, 2013]

Top 5 Zero-Day Threats Of 2013

Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.
[Sep 26, 2013]

5 Reasons FireEye Antimalware Technology Is Overvalued By Wall Street

FireEye is one of the hottest appliance makers in the security industry, but other security vendors are reproducing its antimalware technology and the value of the protection it provides is unproven, experts tell CRN.
[Sep 24, 2013]

5 Ways To Avoid An Epic Facebook Fail

Montana Lt. Governor John Walsh, who is running for the state's U.S. Senate seat, faced scrutiny this week for 'liking' a Facebook page that features pictures of women's breasts. The rogue 'like' was called an honest mistake, but it could be costly to his campaign. Learn how to avoid reputation-damaging mistakes.
[Sep 19, 2013]

10 Ways NSA Surveillance Revelations Could Impact The Channel

From sales of encryption to a potential pushback against cloud services, revelations over NSA surveillance activities could be significant to the channel.
[Sep 11, 2013]

5 Ways To Avoid A New York Times-Style Website Attack

A hacktivist group targeted the underlying domain name system infrastructure, but they used standard hacking techniques to carry out the attack, said experts. Basic security measures could have avoided the disruption.
[Aug 30, 2013]

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.
[Aug 28, 2013]

10 Trending Cyberthreat Attacks In 2013

Ransomware is hijacking systems in greater numbers, and AutoRun malware infections, spread by thumb drives, are also rising, according to McAfee's latest threat report.
[Aug 28, 2013]

Emerging Vendors 2013: Security Vendors

Check out the security vendors that are mixing unique technologies and reliable services with a strong channel presence on this year's Emerging Vendors list.
[Aug 12, 2013]

Droid Danger: Top 10 Android Malware Families

Security researchers have identified the top 10 malware families, from apps containing aggressive advertising tactics and programs containing spyware to text messaging Trojans all aimed at stealing data and bilking device owners of their money.
[Aug 08, 2013]

Broken Security: 5 Ways To Avoid The Coming Cryptopocalypse

The most widely used cryptographic algorithms were introduced in 1976 and are close to being cracked. At the Black Hat conference, researchers urged software makers and businesses to support a newer algorithm to maintain security on the Internet.
[Aug 07, 2013]

Black Hat 2013: 14 Security Firms That Piqued Hackers' Interest

From network monitoring to incident response, these security firms attracted attendees to their vendor booths at Black Hat 2013.
[Aug 06, 2013]

The 10 Biggest Data Breaches Of 2013 (So Far)

When it comes to data breaches, attackers frequently target email addresses and passwords, infiltrating account credential databases at social networks and other online services. Here's a look at some of the top breaches so far this year.
[Jul 31, 2013]

Live At The Lab: Eugene Kaspersky, Malware Experts Talk Threat Landscape

Nation-state driven attacks are increasing in volume and sophistication. Financially motivated attacks continue to steal passwords and drain bank accounts, according to Kaspersky Lab experts.
[Jul 30, 2013]

Top 10 BYOD Risks Facing The Enterprise

From lost devices to cloud storage services, the risks imposed by employee-owned mobile devices could expose sensitive corporate data or, worse, enable an attacker to gain access to the corporate network.
[Jul 26, 2013]

BYOD And MDM: 10 Vendors That Get It

Gartner predicts the mobile device management market will come to an end as we know it. But these 10 market leaders are innovating to address BYOD issues.
[Jul 26, 2013]

Dirty Dozen: Top 12 Spam Countries Identified

Ousting France, Peru and South Korea, three new countries were added to the Sophos' Dirty Dozen list for relaying billions of spam messages around the world.
[Jul 19, 2013]

The 10 Coolest Security Startups Of 2013 (So Far)

These cool information security startups are readying products and unveiling technologies for data encryption, threat detection, bring your own device risks and authentication.
[Jul 19, 2013]

Black Hat 2013: 5 Cool Hacking Tools To Check Out

These hacking tools can be used to manage end-user security training, check the security posture of smartphones or hunt for additional vulnerabilities on a Web application server.
[Jul 16, 2013]


View archives for:  

                         
Top Stories




CHANNEL SERVICES >>