Security News - Page 21

Microsoft Seizes Servers In Zeus Cyberfraud

Microsoft Seizes Servers In Zeus Cyberfraud

.

The software maker said that its cybercrime investigation group took legal and technical actions to fight notorious criminals who infect computers with Zeus.

Take Cognisance Of Partner Cos In InfoSec Plans

Take Cognisance Of Partner Cos In InfoSec Plans

.

Alpna Doshi, CIO - Reliance Communications, opines that channel partners, vendors and customers should also be considered while designing the information security of the company.

Software Combo That Turns Computers Impenetrable

Software Combo That Turns Computers Impenetrable

.

A triple combo of protective software to foolproof computers against various security threats

Cisco Unveils Video Surveillance Software On Its UCS Platform

Cisco Unveils Video Surveillance Software On Its UCS Platform

.

Virtualised applications on the network support scalability and performance increases

Hacktivists Responsible For Most Data Theft In 2011: Survey

Hacktivists Responsible For Most Data Theft In 2011: Survey

.

Cyber security analysts said that they expect hacktivism to continue, though it may not be as severe.

Unique 'Fileless' Bot Attacks Visitors To News Sites

Unique 'Fileless' Bot Attacks Visitors To News Sites

.

Experts from Kaspersky Lab uncovered the hidden attack, which exploited a vulnerability in the teasers used by a number of popular Russian news sources.

Cos Employing CISOs Report Reduced Data Breach Costs

Cos Employing CISOs Report Reduced Data Breach Costs

.

Symantec and Ponemon Institute release findings of the 'Cost of Data Breach' study.

Symantec To Acquire Nukona

Symantec To Acquire Nukona

.

Acquisition to help businesses embrace the BYOD movement.

Publicly Shared Email Ids Can Put Enterprises At Risk

Publicly Shared Email Ids Can Put Enterprises At Risk

.

Carl Leonard, Senior Security Research Manager (EMEA), Websense Security Labs, talks about the trend of social spear phishing and how enterprise can safeguard themselves.

Sophos Positioned In Leaders Quadrant For Unified Threat Management

Sophos Positioned In Leaders Quadrant For Unified Threat Management

.

The quadrant is based on an assessment of a company's ability to execute and completeness of vision.

Security In The Times Of Social Media, Cloud And BYOD

Security In The Times Of Social Media, Cloud And BYOD

.

There is at least a perceived security risk in each of these. But how real is it?

112 Govt Websites Hacked In Three Months: Pilot

112 Govt Websites Hacked In Three Months: Pilot

.

However, the minister also said that the number of internet frauds involving Rs.1 lakh and above have declined over the last three years.

Dell To Buy SonicWall From Thoma Bravo

Dell To Buy SonicWall From Thoma Bravo

.

Dell to buy the network security products maker as it tries to tap growing demand for corporate network protection.

Risk Management: The CIO Perspective

Risk Management: The CIO Perspective

.

Compliance has been driving risk management at enterprises but more recently, it is being seen as a contributor to the bottomline.

Hackers Winning Security War: Execs

Hackers Winning Security War: Execs

.

CEOs, whose companies have been hacked, speak up on fighting the constant battle against security threats.

Security Services Threat Intelligence Mkt To Reach $905 Mn By 2014

Security Services Threat Intelligence Mkt To Reach $905 Mn By 2014

.

More formidable security threats and high-profile attacks drive enterprise demand.

McAfee Unveils Database Security Solution

McAfee Unveils Database Security Solution

.

Features protection for Teradata databases, database audit plug-in for MySQL and ability to manage database security outside of its own silo.

NetIQ Unveils SIEM Solution

NetIQ Unveils SIEM Solution

.

Announces Sentinel 7, the Security Information and Event Management solution.

RSA Collaborates With Tech Partners For Mobile Security

RSA Collaborates With Tech Partners For Mobile Security

.

EMC's RSA security division helps enterprises embrace mobility and BYOD strategies without sacrificing security and usability.

Websense Adds Mobile Security To Its TRITON Suite

Websense Adds Mobile Security To Its TRITON Suite

.

Combines web security, data security, malicious app and mobile malware protection, with MDM features.

51% Cos Lose Data Through Mobile Devices

51% Cos Lose Data Through Mobile Devices

.

Mobile devices help business, but 59% of employees dodge security controls.

Ensure Thorough Risk Assessment Of Cloud Vendor

Ensure Thorough Risk Assessment Of Cloud Vendor

.

Sachin Jain, CIO and CISO, Evalueserve provides his recommendations on 'Dos' and 'Don'ts' for vendor contracts and SLAs when moving to the cloud.

HP Unveils Integrated Platform Of Risk-Driven Security Solutions

HP Unveils Integrated Platform Of Risk-Driven Security Solutions

.

New solutions deliver enterprise visibility with context to reduce business risk across traditional, mobile and cloud environments.

Social Media Can Transform Enterprise Business Continuity Mgmt

Social Media Can Transform Enterprise Business Continuity Mgmt

.

75% cos with BCM programs will have public social media services in their crisis communications strategies by 2015.

Cyber Risk Still Not Getting Adequate Attention From Boards, Senior Execs

Cyber Risk Still Not Getting Adequate Attention From Boards, Senior Execs

.

RSA and Carnegie Mellon CyLab research surveyed Forbes Global 2000 list of CEOs, CFOs, CROs and board members of governance practices.

Data Security Hinges On How Employees Manage Data

Data Security Hinges On How Employees Manage Data

.

Satish Warrier, CISO, Godrej Industries talks about the importance of creating awareness among employees to prevent loss of confidential data

Android Bug Opens Devices To Outside Control: Experts

Android Bug Opens Devices To Outside Control: Experts

.

Experts uncover flaw that they say hackers can exploit to gain control of the devices.

Confidential Data Is At Risk Even With Policies In Place

Confidential Data Is At Risk Even With Policies In Place

.

More than half of workers don't always follow or are unaware of their company's security policies, says Xerox and McAfee survey.

Check Point Puts Security Solution On Cloud With AWS

Check Point Puts Security Solution On Cloud With AWS

.

Customers can now use Check Point Software blades with a virtual appliance in the cloud.

IBM Advances Security Intelligence To Help Cos Combat Increasing Threats

IBM Advances Security Intelligence To Help Cos Combat Increasing Threats

.

IBM to tap security analytics and threat intelligence from more than 400 sources, including the X-Force Threat Feed.