Global network and data-security spending will exceed $10 billion by 2016, according to a market forecast from ABI Research, announced on Jan. 10. Spending on secure routers, unified threat-management appliances, VPNs, network-access control, firewalls and intrusion detection/prevention systems will rise from $6 billion in 2010 and exceed $10 billion by 2016, ABI Research said. “In […]
MegaPath announced on Jan. 10 a new managed security as a service offering, which can be entirely cloud-based, on-premise or a mix of both. Customers can decide whether to have the complete managed solution delivered from the cloud, have the equipment on-premises or have a hybrid of cloud and on-premise systems, according to MegaPath. The […]
Enterprise application services provider Blue Coat has introduced a new easy-to-install Web security appliance aimed at small to midsize companies with limited IT support resources. Dubbed the ProxyOne, the appliance is designed for firms with limited IT resources and can support between 100 and 2,000 users. Based on the same engine that powers the Proxy […]
The Department of Treasury has moved its main Website and four other agency sites to Amazon Web Services, said Smartronix, the systems provider that handled the migration, on Jan. 10. The revamped Treasury.gov Website, SIGTARP.gov, MyMoney.gov, TIGTA.gov and IRSOversightBoard.treasury.gov are all now hosted on Amazon Elastic Compute Cloud. The Treasury.gov site was redesigned on a […]
Global IT spending is expected to grow overall in 2011, according to two different analyst reports. However, both Gartner and Forrester analysts said spending in the PC segment will be impacted the increasing popularity of tablets and smartphones. Global IT spending will grow 7.1 percent to $1.7 trillion in 2011, market research firm Forrester Research […]
Malware from social networking sites are a bigger security threat for mobile devices than for hacked applications or mobile Trojans, according to antivirus software provider BitDefender. While there is a lot of focus on mobile malware such as Geinimi, the Google Android Trojan, or malicious apps in Apple’s App Store, it is far easier and […]
Specialized software running over Amazon’s cloud services can be used to crack passwords on wireless networks, said a German security researcher on Jan. 7. Thomas Roth, a security and software engineering consultant at Lanworks AG, in Cologne, Germany, will be publicizing his research at the Black Hat conference in Washington, D.C., Jan. 16-17. According to […]
10 Hot Global Trends IT Pros Need to Know by Fahmida Y Rashid 1) Agile Not the Next Silver Bullet More project managers and developers will adopt the Agile methodology for software development. They will also realize Agile has its own challenges and is not intended to be a cure-all for any type of software […]
Security oversights by Mac developers and Apple allow users to pirate or modify applications downloaded from the Mac App Store, several users reported on Jan. 6. Less than 24 hours after Apple unveiled the Mac App Store for the Mac OS X, reports emerged on various user forums, including Pastebin and Daring Fireball, that some […]
The Obama Administration is committed to reducing Internet fraud by developing a comprehensive, national online identity strategy, United State Commerce Secretary Gary Locke said on Jan. 7. Cyber-security” and digital identity was a “national top priority” issue, said Locke. Locke was joined by Howard Schmidt, the White House Cybersecurity coordinator, at the Stanford Institute for […]