Eric Knorr
Contributing writer

Security at the barricades

analysis
Dec 17, 20073 mins

The bad news is that no organization with an Internet connection can ever be truly secure. The good news: The tools and the law enforcement are getting better. As long as bad guys want to steal our data, infect us...

The bad news is that no organization with an Internet connection can ever be truly secure. The good news: The tools and the law enforcement are getting better.

As long as bad guys want to steal our data, infect us with malware, or choke us with spam, we’ll always be in a state of siege. Obsessing over the whole range of threats isn’t good for anyone’s health. But if you work in IT, you can’t ignore those perils either, and you’ll welcome any cost-effective technology that keeps them a little further at bay.

As InfoWorld senior writer Matt Hines reveals in his exclusive story, “Google eyes security services,” help is on the way from an unexpected quarter. You may be aware that Google bought the anti-spam service Postini in July — and even, perhaps, that it acquired security software vendor Green Border a couple of months before that. But as Matt reports, Google’s ambitions go much further.

Basically, the company intends to turn Postini into a complete hosted security platform — not just for blocking spam, but to deploy a whole range of services. Already, the latest Postini version included with Google Apps Premier Edition protects against zero day threats and flags possible outgoing data leaks, such as social security or credit card numbers. According to Matt, that’s only the beginning; Google’s ultimate ambition is to provide comprehensive, enterprise-class security as a service.

We’ll have to wait and see if large organizations, which tend to prefer absolute control over their own security, will be willing to cede some of that to Google. Meanwhile, our review of the new Mu-4000 security appliance clearly indicates that the industry hasn’t run out of innovative products that can help you sleep a little easier.

This new version of Mu’s Security Analyzer identifies vulnerabilities by hitting the network with “fuzzed” permutations of normal packets and commands across 50 different protocols. And considering the complexity of what it does, the InfoWorld Test Center found it amazingly easy to configure. Reviewer Roger Grimes sees the Mu-4000 as a highly useful weapon in the battle to stave off malware threats.

But wait a minute … who are the bad guys who want to wreak all this havoc anyway? Contributor Andy Brandt gives us a glimpse of what the perpetrators of IT mayhem are like in “True crime: The botnet barons.” Late last month the feds announced the indictment or conviction of eight perpetrators, all of whom used botnets to achieve their nefarious ends. Andy’s story examines what they did and even a little about why they did it.

The scary part is that these perps were relatively small fry. According to most security experts, the real kingpins operate outside the U.S. on a much larger scale. No need to worry about that threat 24/7, friends. On the other hand, keep your guard up.

Eric Knorr

Eric Knorr is a freelance writer, editor, and content strategist. Previously he was the Editor in Chief of Foundry’s enterprise websites: CIO, Computerworld, CSO, InfoWorld, and Network World. A technology journalist since the start of the PC era, he has developed content to serve the needs of IT professionals since the turn of the 21st century. He is the former Editor of PC World magazine, the creator of the best-selling The PC Bible, a founding editor of CNET, and the author of hundreds of articles to inform and support IT leaders and those who build, evaluate, and sustain technology for business. Eric has received Neal, ASBPE, and Computer Press Awards for journalistic excellence. He graduated from the University of Wisconsin, Madison with a BA in English.

More from this author