Profile

Ellen Messmer
Member since: April 2011
Bio: Ellen Messmer writes about security and financial information technology topics for Network World. Follow her on Twitter @MessmerE.
Areas of Interest:
Activity
-
Airport's IT transformation to cloud, BYOD support is saving money, boosting security.
1 day 18 hours ago
-
Cisco, which wants to expand its clout into the industrial networks used by power-generation utilities to support the electric grid, today announced an expansion of its "smart grid" portfolio with ruggedized and low-latency switches and other equipment intended for use in electric-power distribution systems.
2 days 2 hours ago
-
Cloud computing services, whether software as a service (SaaS) or infrastructure as a service (IaaS), are subject to taxes. Reid Okimoto, senior manager in the state and local tax practice at KPMG, shares tips to help you understand the real cost of cloud computing.
2 days 19 hours ago
-
The popular Snapchat photo-messaging app used mainly by Android and iOS mobile device owners to share images that then self-destruct after 10 seconds is the sort of security idea that businesses say can help them secure online transactions with business partners.
6 days 16 hours ago
-
Open source has become a staple for software development in the enterprise, but keeping track of it and maintaining security for it remains an elusive goal, according to a survey of more than 3,500 data architects and developers.
1 week 1 day ago
-
Trend Micro announces a slate of cloud-based security services that it says protect servers for Amazon Web Services (AWS) customers.
1 week 2 days ago
-
Latest Anti-Phishing Working Group report shows rise of attacks on virtual-server farms at hosting facilities.
1 week 2 days ago
-
McAfee Thursday announced it’s providing a one-time password function as part of its Cloud Single Sign On service for more securely provisioning and de-provisioning hundreds of cloud-based services for enterprise use.
2 weeks 54 min ago
-
Ellen Messmer wrote DHS use of deep packet inspection technology in new net security system raises serious privacy questions Department of Homeland Security is preparing to deploy a much more powerful version of its EINSTEIN intrusion-detection system that can capture e-mail content and personally identifiable data.2 weeks 17 hours ago
-
Ellen Messmer wrote Business students to get HP-designed technical course for cloud, mobile, security issues College business students need to gain a grasp of technical issues related to cloud computing, big data, security and other network issues they're likely to come across in their careers, so HP is now offering its first technical associate certification for them to cover these topics while in college.2 weeks 1 day ago
-
Ellen Messmer wrote Boeing technology offers secure, efficient way to tie together business, industrial nets The Boeing Company is pioneering a way to securely bring together business IT networks with what ordinarily are entirely separate networks for industrial-control systems (ICS) in order to gain efficiencies and benefits in information-sharing in manufacturing.2 weeks 2 days ago
-
Open Group's "Open Trusted Technology Provider Standard" backed by Cisco, IBM, NSA, DoD, others
3 weeks 20 hours ago
-
Business and government organizations with sensitive data appear likely to hold back from cloud-based services until things improve.
4 weeks 14 hours ago
-
The Secure Shell (SSH) cryptographic network protocol that's supported in software for server authentication and machine-to-machine communications is headed for a significant update.
4 weeks 1 day ago
-
The Department of Defense's inspector general has reposted and updated a report critical of the Army's shortcomings in handling cybersecurity for commercial mobile devices (CMD), with some changes to correct for what it says were mistakes.
4 weeks 5 days ago
-
The recent release of the BlackBerry 10 operating system sets the stage for a security evolution as well, according to Alex Manea, manager of security services at BlackBerry.
4 weeks 6 days ago
-
A report from the Inspector General of the U.S Department of Defense that's critical of the way the Army has handled mobile-device security has been inexplicably yanked from the IG DoD public website but can still be found in the Google caching system.
5 weeks 17 hours ago
-
Dataguise says the latest version of its data-protection product enables users to encrypt sensitive data right down to specific fields within an open source Apache Hadoop database.
5 weeks 2 days ago
-
Forrester Research predicts that with the "bring your own device" (BYOD) trend expected to increasingly include laptops in addition to smartphones and tablets, the approach to managing those devices is in for some big changes.
5 weeks 6 days ago
-
HP says it now has a free service called "Fortify My App" that lets anyone building mobile or Web applications upload code to the Fortify software-as-a-service and get a limited analysis about whether the code has specific vulnerabilities or design flaws.
6 weeks 23 hours ago
-
Sandboxing -- one alternative to traditional signature-based malware defense -- is seen as a way to spot zero-day malware and stealthy attacks in particular. While this technique often effective, it's hardly foolproof, warns a security researcher who helped establish the sandboxing technology used by startup Lastline.
6 weeks 1 day ago
-
The Department of Defense (DOD) has begun including the security certification known as "CompTIA Advanced Security Practitioner" (CASP) in its accepted roster of industry-based security exams to prove technical skills, the trade group says.
6 weeks 5 days ago
-
Despite its leadership position in most enterprise security product areas, Cisco faces a number of technological and competitive challenges to stay out in front.
7 weeks 1 hour ago
-
A recent round of flaws discovered in open-source software has reignited concerns that security is getting bypassed in the rush to continue expanding the large and extremely popular code base used by millions.
8 weeks 1 day ago
-
Ellen Messmer wrote Cloud forensics: In a lawsuit, can your cloud provider get key evidence you need? Any business that anticipates using cloud-based services should be asking the question: What can my cloud provider do for me in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyberattack or data breach?9 weeks 20 hours ago
- 1 of 9
- ››
Friends' Activity
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.
Activity
- Comments: 0
- Friends: 0
- Likes: 0
- Following: 0
- Questions Asked: 0
- Followers: 1
- Questions Answered: 0















