Security News - Page 3

There Is No Such Thing As 100% Security

There Is No Such Thing As 100% Security

.

Tom Scholtz, VP Distinguished Analyst, Gartner explains how even the best of companies tend to miss out on certain aspects of security or they are just not up to satisfactory levels.

Indian CISOs Gear Up To Tackle New Age Threats

Indian CISOs Gear Up To Tackle New Age Threats

.

Indian economy is facing a tough time. Amidst such an unstable scenario, a serious cyber breach/attack can dent a company's balance sheet and image in a not-so-good way.

Cos Fear Their Privacy Activities Are Insufficient: Gartner

Cos Fear Their Privacy Activities Are Insufficient: Gartner

.

Companies must refocus privacy efforts to deal with the impact of the Nexus of Forces.

Security Appliance Market Exhibits Steady Growth In 2Q13

Security Appliance Market Exhibits Steady Growth In 2Q13

.

Despite the increasing prevalence of virtual and SaaS-based solutions, appliances remain the predominant delivery method for network security products, finds IDC.

Not Considering Insider Fraud A Top Security Priority Is A Costly Mistake

Not Considering Insider Fraud A Top Security Priority Is A Costly Mistake

.

The threat of insider fraud is a growing risk that can result in tangible financial loss to businesses, finds survey.

65% Cos Use In-House Resources For IT Security Training

65% Cos Use In-House Resources For IT Security Training

.

Companies assign their own Tech Support Department to train company employees in matters of IT security, rather than hiring outside IT consultants or security professionals.

India Gets 'Authorising Nation' Status For IT Products

India Gets 'Authorising Nation' Status For IT Products

.

It will enable India to test IT and electronics products and issue certificates, which will be acceptable internationally.

Hackers Target iPhone 5S Fingerprint Scanner

Hackers Target iPhone 5S Fingerprint Scanner

.

Hackers gearing up for a contest to crack the device's first-ever fingerprint scanner, a high-tech feature that Apple says makes users' data more secure.

CA Technologies Named Leader In IAM By Forrester

CA Technologies Named Leader In IAM By Forrester

.

CA Technologies has been named a "Leader" in "The Forrester Wave: Identity and Access Management Suites, Q3 2013."

HP Unveils Products And Services For Enterprise Security

HP Unveils Products And Services For Enterprise Security

.

New offerings disrupt adversaries, manage risk and extend organisations' security capabilities.

Customer Contact Centres' Criticality During Disasters Necessitate BC/DR Strategies

Customer Contact Centres' Criticality During Disasters Necessitate BC/DR Strategies

.

Frost & Sullivan's survey of IT managers revealed that only 31% of the respondents claimed their organisations are prepared to handle outages and disasters.

Microsoft Rushes Out Software Fix To Prevent Browser Attacks

Microsoft Rushes Out Software Fix To Prevent Browser Attacks

.

Microsoft released the software as an emergency measure to protect customers after learning about "extremely limited, targeted attacks" that made use of the newly discovered bug.

Make Security A KPI For Employees

Make Security A KPI For Employees

.

Maria Bellarmine, CISO, Head - Infosec Group, Tech Mahindra Ltd. talks about making security awareness part of employees' KPIs ensuring it's not only an IT driven initiative.

Security In India Is A Cloudy Issue

Security In India Is A Cloudy Issue

.

Sasi Murthy, Head, Security Products & Solutions, Blue Coat talks about key dynamics, especially cloud, changing the InfoSec landscape today in India and factors to consider for a agile security program.

New Java And Flash Research Shows A Dangerous Update Gap

New Java And Flash Research Shows A Dangerous Update Gap

.

Websense continues its Java security research series by analysing other plug-ins, browser extensions and rich internet applications that are commonly exploited.

Dr. WEB Warns Of New Trojan For Linux Having Heavy Payload

Dr. WEB Warns Of New Trojan For Linux Having Heavy Payload

.

Analysis showed that this Trojan {also known as the Hand of Thief) is equipped not only with a wide array malicious features but also can conceal itself from anti-viruses.

Sophos Mobile Control Delivers Support For Apple iOS 7

Sophos Mobile Control Delivers Support For Apple iOS 7

.

Sophos announced an update for customers to manage the new business-focused features of Apple's latest version from the Sophos web-based console.

Don't Re-Invent The Wheel For Cloud Security

Don't Re-Invent The Wheel For Cloud Security

.

Ian Yip, Identity, Security & Governance Product Manager, APAC, NetIQ says that instead of changing security policies for the cloud, minimise information risk by carefully selecting what goes on the cloud.

Online Banking Malware Up 29% From Previous Quarter

Online Banking Malware Up 29% From Previous Quarter

.

Banking malware jumps from PC to mobile platform, finds Trend Micro Q2 2013 Security Threat Round Up report.

Compliance No Longer A Primary Driver Of IT Risk And Security Measures

Compliance No Longer A Primary Driver Of IT Risk And Security Measures

.

Gartner says compliance is an outcome of a well-run risk management program and should not dominate CIOs' decision-making.

Virtualisation, Containers And Sandboxing Should Be On Your Radar Screen

Virtualisation, Containers And Sandboxing Should Be On Your Radar Screen

.

It's the need of the hour given the decreasing effectiveness of signature-based approaches to protect us from advanced targeted attacks and advanced persistent threats.

Kaspersky Lab Reinforces Its Position In The Endpoint Security Market

Kaspersky Lab Reinforces Its Position In The Endpoint Security Market

.

Kaspersky Lab has been ranked third largest vendor in the worldwide Corporate Endpoint Security Suite market by IDC's report.

First Ever Case Of Mobile Trojan Spreading Via 'Alien' Botnets Seen

First Ever Case Of Mobile Trojan Spreading Via 'Alien' Botnets Seen

.

For the first time in the history of mobile cybercrime, a Trojan is being spread using botnets controlled by other criminal groups.

FireEye Announces NX 10000 Threat Prevention Platform

FireEye Announces NX 10000 Threat Prevention Platform

.

To quadruple the capacity to Scale web-based cyber attack protection.

Inside Tata Teleservices' Security Ops Centre

Inside Tata Teleservices' Security Ops Centre

.

Ashish Pachory, CIO - Tata Teleservices elaborates on the rationale and the functioning of its Security Operation Centre.

Over 50% Of Android Users Vulnerable To Malware And Data Theft: Survey

Over 50% Of Android Users Vulnerable To Malware And Data Theft: Survey

.

As per the survey only 40% of smartphone and 42% of tablet owners stated that they have installed a security solution on their devices and are now using it.

ESET Secure Authentication Adds Integration To Microsoft Exchange Server 2013 And VMware Horizon View

ESET Secure Authentication Adds Integration To Microsoft Exchange Server 2013 And VMware Horizon View

.

This mobile-based solution provides a secure mobile two-factor one-time-password (2FA OTP) authentication system.

Sophos Brings High Performance And Simple Management To Server Protection

Sophos Brings High Performance And Simple Management To Server Protection

.

Sophos Server Protection offers flexible cross-platform antivirus for virtual and physical servers.

WatchGuard Introduces WatchGuard XCS 880

WatchGuard Introduces WatchGuard XCS 880

.

The XCS 880 protects against inbound threats such as virus, blended threats and network attacks, while helping control outbound information to prevent data loss.

35% Growth In Android-based Malware In Q2

35% Growth In Android-based Malware In Q2

.

Second quarter report warns of SMS-stealing banking malware, fraudulent dating apps, and data-stealing apps.