Video Screencast Help
Information Unleashed
Showing posts tagged with Security
Showing posts in English
Sean Doherty | 13 Feb 2012 | 0 comments

One hot topic in IT and information security today is the Advanced Persistent Threat, usually abbreviated to APT. However, the P in APT might as well stand for People. And therein lies a clue as to how APTs differ from other targeted attacks, something about which there has been a some confusion.

A standard targeted attack, while often requiring a significant investment of time, does not have dedicated personnel over a long period. If the assets that they are targeting are harder to reach than expected, or pwned asset is removed or patched, then that will often end the attack and another victim selected. Some targeted attacks are even highly automated. In an APT, however, there is someone continually guiding the attack, making adjustments to counter when the victim tries to stop it. It’s very much a person-to-...

Tom Powledge | 01 Feb 2012 | 0 comments

Any knowledgeable entrepreneur would cite innovation as a key to business success in today’s world. And yet innovation means more than simply inventing the next great iPhone app. It can be as simple as implementing an existing idea into the way you do business. The core of innovation is change – being unafraid to look critically at how you do things and see if maybe there’s a better way. Just as evolutionary change keeps organisms one step ahead of the competing species, searching for ways to improve your business can give you an edge over your competitors.

Innovation for your organization might be as simple as identifying and eliminating redundant tasks, or updating elements of your IT infrastructure. In particular, finding a way to do more with less is crucial in today’s sluggish economy. One significant opportunity for innovation...

Gina Sheibley | 09 Jan 2012 | 2 comments

 

In 2011, corporate information emerged as the most coveted asset in the cybercrime war, the vast amount of digital information in the world grew even more rapidly and the surge in mobile devices in the workplace added another layer of complexity for IT executives.

So what's next?  I sat down with Francis deSouza, Symantec's Group President of Enterprise Products and Services, to get a sense of the challenges CIOs will face in their quest to keep their information secure and accessible in 2012.  Following is a recap of our discussion including a few key predictions to consider as you plan for the year ahead: 

Question 1:Francis, you spend a lot of time with our customers.  What challenges do they face in the year ahead?

Francis deSouza: As...

Michael Parker | 13 Sep 2011 | 1 comment

New Drivers of VirtualizationThe drivers of virtualization have changed.
That is what VMware’s Chief Development Officer and co-President, Richard McAniff, said in February, 2011. And in the months since, we’re finding out how true that statement was. According to McAniff, the new drivers are resiliency, high availability, backup, disaster recovery, and of course, security.

Why are they important?
These new drivers are important because businesses are moving from virtualizing test, print, web, and other non-critical servers and applications to business line applications and servers – for example – your CRM, HR system, accounts payable system, and transaction-based...