Security News - Page 20

McAfee Unveils Situational And Risk Aware SIEM Solution

McAfee Unveils Situational And Risk Aware SIEM Solution

.

McAfee Enterprise Security Manager provides intelligence and takes SIEM to a real-time understanding of the global threat landscape.

Vulnerability Volume Down, Not Risk: HP

Vulnerability Volume Down, Not Risk: HP

.

HP Research identifies new era of security risk, shifting vulnerability landscape.

'Dirty Disks' Raise Questions About Cloud Security

'Dirty Disks' Raise Questions About Cloud Security

.

Context Information Security identifies significant flaws in the implementation of cloud infrastructure services offered by some providers.

Worldwide UTM Mkt Surpassed The $1 Billion Mark In 2011

Worldwide UTM Mkt Surpassed The $1 Billion Mark In 2011

.

APAC had the strongest growth of any region in 2011, growing 31.8 percent in 2011.

How Cybercriminals Infect Networks And Steal Data Undetected

How Cybercriminals Infect Networks And Steal Data Undetected

.

Websense Security Labs outlines top recommendations and insights for protecting from and containing sophisticated malware and targeted attacks.

Adopt Ethical Hacking As A Security Practice: Frost & Sullivan

Adopt Ethical Hacking As A Security Practice: Frost & Sullivan

.

Cos should consider the value of ethical hacking services, which are rapidly gaining attention as an essential security practice that should be performed on a regular basis.

Cos Should Incorporate IT Security Into Corporate Governance Framework

Cos Should Incorporate IT Security Into Corporate Governance Framework

.

New technologies incite new attacks that challenge business enterprises, notes Frost & Sullivan

Data Breaches Cost India Inc. Rs. 53.5 Mn: Symantec

Data Breaches Cost India Inc. Rs. 53.5 Mn: Symantec

.

Malicious attacks are the costliest type of data breach in India, says Symantec.

Android Threats Dominate This Quarter's Cybercrime Scene

Android Threats Dominate This Quarter's Cybercrime Scene

.

Trend Micro issues new security roundup report for Q1 2012.

Enterprises Lack Choice Of Endpoint Security Solutions: Ovum

Enterprises Lack Choice Of Endpoint Security Solutions: Ovum

.

Enterprises do not have a clear and comparable choice of endpoint protection solutions that completely meet today's mobile working security requirements, says Ovum.

Netmagic Gets CERT-In Empanelled For IT Security Auditing

Netmagic Gets CERT-In Empanelled For IT Security Auditing

.

Empanelment empowers Netmagic to carry out IT security audits, including vulnerability assessment and penetration testing.

Structured Approach To Organisational Risk Management

Structured Approach To Organisational Risk Management

.

Managing risk for an enterprise has become an important business driver and an act of survival.

Delivering Tomorrow's Backup And Recovery Infrastructure

Delivering Tomorrow's Backup And Recovery Infrastructure

.

The next generation of data protection and recovery software functionality continues to evolve.

44% Of Cos Worldwide Plan To Increase IT Investments In 2012: ISACA

44% Of Cos Worldwide Plan To Increase IT Investments In 2012: ISACA

.

ISACA releases COBIT 5, the business framework for the governance and management of enterprise IT.

Wolters Kluwer Helps Banks Meet RBI Guidelines

Wolters Kluwer Helps Banks Meet RBI Guidelines

.

Wolters Kluwer Financial Services helps banks meet regulatory reporting and compliance requirements in India.

Pitney Bowes India Introduces LobbyTrac: Security Visitor Mgmt System

Pitney Bowes India Introduces LobbyTrac: Security Visitor Mgmt System

.

Solution streamlines the process of visitor management and enables organisations to control access to their facilities.

WatchGuard Positioned In Gartner's Leaders Quadrant For UTM

WatchGuard Positioned In Gartner's Leaders Quadrant For UTM

.

According to Gartner, the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize business requirements.

McAfee Launches MOVE To Secure Virtualised Environments

McAfee Launches MOVE To Secure Virtualised Environments

.

McAfee's AV solution provides comprehensive defences against physical and virtual attacks.

How To Keep Your Data And Devices Safe On The Move

How To Keep Your Data And Devices Safe On The Move

.

Tips to avoid having sensitive data stolen or devices infected while travelling.

Sophos Acquires DIALOGS

Sophos Acquires DIALOGS

.

Together with DIALOGS, Sophos strengthens its mobile footprint, providing complete security for mobile workforces.

New 'Mousetrap Trojan' Steals Your Money By Chain Reaction

New 'Mousetrap Trojan' Steals Your Money By Chain Reaction

.

New script downloads an applet, that downloads a downloader Trojan, that downloads a banker Trojan, that downloads... pure malice.

SafeNet Unveils White Box Cryptography Software Protection Solution

SafeNet Unveils White Box Cryptography Software Protection Solution

.

Solution protects security algorithms from attacks in "white box" environments.

Security Breach Hits U.S. Card Processors, Banks

Security Breach Hits U.S. Card Processors, Banks

.

Payment network operators MasterCard, Visa, American Express and Discover Financial Services confirmed they were affected.

BYOD: Risks And Remedies

BYOD: Risks And Remedies

.

The demand to use smart devices in and for the enterprise is rapidly rising. However, IT leaders are still hesitant to cave in with the high risks posed by BYOD phenomenon.

Traditional Risk Mgmt Insufficiently Agile To Deal With Complex Threats

Traditional Risk Mgmt Insufficiently Agile To Deal With Complex Threats

.

Information Security Forum provides organisations with insights into managing risks as security threats collide.

Embed Security In The Source Code

Embed Security In The Source Code

.

Michele Orru', Penetration Testing Specialist, Royal Bank of Scotland Group, in conversation with Revathi Raghavan, suggests developers should be taught the importance of secure code.

Collaborative Business Environment Needs Sound Risk Mgmt

Collaborative Business Environment Needs Sound Risk Mgmt

.

How do you ensure the same rigour for security compliance when you have so many stakeholders that may not directly, or even indirectly, be in your sphere of influence?

India Inc Loses Rs.171.94 Crore From Phishing Attacks In 2011

India Inc Loses Rs.171.94 Crore From Phishing Attacks In 2011

.

RSA has ranked India in the top five most targeted countries for phishing attacks.

Ciena, SafeNet Ally For Data Protection In Commercial, Govt Networks

Ciena, SafeNet Ally For Data Protection In Commercial, Govt Networks

.

Companies to jointly sell high-speed, low-latency Ethernet link encryption solutions specifically designed to work at Layer 2.

M&As Surge With Need For More Network Security

M&As Surge With Need For More Network Security

.

The demand for more sophisticated protection makes niche network security firms prime takeover targets.