Security News - Page 5

CA Technologies Simplifies Data Protection For Linux

CA Technologies Simplifies Data Protection For Linux

.

CA ARCserve D2D for Linux delivers efficient data protection and recovery for virtual and physical Linux Server Environments.

Corporate Demand For Insurance Against Computer Hacking, Internet Breakdown Grows

Corporate Demand For Insurance Against Computer Hacking, Internet Breakdown Grows

.

Insuring against cyber threats is seen as a potentially lucrative market, particularly now that lawmakers are promising bigger fines for companies that lose data.

45% Cos Fear More Complex Attacks On Their IT Infrastructures

45% Cos Fear More Complex Attacks On Their IT Infrastructures

.

Threat of targeted attacks redefines requirements for corporate-class security solutions, finds Kaspersky.

EMC Acquires Aveksa

EMC Acquires Aveksa

.

Aveksa Joins RSA Security Division to help transform Authentication and Identity Management across enterprise, mobile and cloud environments.

Cyber Security Roadmap For Businesses

Cyber Security Roadmap For Businesses

.

ESET lists down the ABCs of proactive protection for businesses.

Gartner's Solutions For Firms At Risk Of Attack In 2013

Gartner's Solutions For Firms At Risk Of Attack In 2013

.

E-Commerce and financial services companies to be hit by increasingly sophisticated attacks and attackers in 2013, warns Gartner.

Trend Micro, INTERPOL Ally In The Fight Against Cybercrime

Trend Micro, INTERPOL Ally In The Fight Against Cybercrime

.

Trend Micro Inc., a security software and solutions provider, has announced its collaboration with INTERPOL to support global law enforcement programs against cybercrime.

56% Cos Don't Know What CSPs Are Doing To Protect Their Accounts

56% Cos Don't Know What CSPs Are Doing To Protect Their Accounts

.

Cyber-Ark survey discovers that 86% of large enterprises either don't know or had grossly underestimated the magnitude of their privileged account security problem.

FireEye Uncovers Key Characteristics To Identify Origin Of Advanced Cyber Attacks

FireEye Uncovers Key Characteristics To Identify Origin Of Advanced Cyber Attacks

.

The report also identifies an attack tactic employed by the Chinese military group known as "Comment Crew," previously linked to targeted attacks against the U.S. government.

Norton Mobile Security Delivers App Privacy Protection

Norton Mobile Security Delivers App Privacy Protection

.

New Norton Mobile Insight intelligence technology performs dynamic mobile app analysis, to reveal which ones leak personal information.

1 In 5 Phishing Attacks Target Banks And Other Financial Organisations

1 In 5 Phishing Attacks Target Banks And Other Financial Organisations

.

According to Kaspersky Lab, 20.64 percent of all phishing threats registered between May 2012 and April 2013 were aimed at accounts of banks and other financial organisations worldwide.

What One Security Breach Can Cost Cos: $649,000

What One Security Breach Can Cost Cos: $649,000

.

The lion's share of losses is caused by the incident itself - lost opportunities and profits, as well as payments to third-party remediation specialists.

Virtustream, SafeNet To Enable Secure Virtualisation And Cloud Migration

Virtustream, SafeNet To Enable Secure Virtualisation And Cloud Migration

.

Virtustream's IaaS now includes SafeNet portfolio of data protection solutions - encryption, key management, and strong authentication for crypto framework for cloud deployments.

Mobile Threats Continue Rampant Growth As Attackers Become More Entrepreneurial

Mobile Threats Continue Rampant Growth As Attackers Become More Entrepreneurial

.

Juniper Networks, has released its third annual Mobile Threats Report showing the rapid growth and evolution of mobile malware into a profitable business for attackers.

HCL Infosystems, Sanovi Partner To Offer Disaster Recovery As A Service

HCL Infosystems, Sanovi Partner To Offer Disaster Recovery As A Service

.

With this engagement, Sanovi becomes a HCL Blu Enterprise Cloud partner as the technology provider for DR Management solutions.

Sophos Launches Complete MSP Security

Sophos Launches Complete MSP Security

.

With new pay-as-you-go offering, Sophos makes it simple for managed service providers to manage and grow their businesses.

Maharashtra Sales Tax Department Partner With SAS To Prevent Revenue Leakages

Maharashtra Sales Tax Department Partner With SAS To Prevent Revenue Leakages

.

The SAS analytics solutions will help MSTD leverage data-driven decision making in devising policies to maximise tax collection through universal coverage of all eligible tax payers.

Installation Of Web App Firewalls On A Rise In APAC: Frost & Sullivan

Installation Of Web App Firewalls On A Rise In APAC: Frost & Sullivan

.

The increasing use of web applications in enterprises, along with the rise in cyber attacks, has lent momentum to the web application firewall (WAF) market in Asia-Pacific.

F5 Networks Announces New Firewall Security And Management Solutions

F5 Networks Announces New Firewall Security And Management Solutions

.

The S/Gi firewall is offered with F5's BIG-IP Advanced Firewall Manager (AFM), a full-proxy network firewall that can be deployed as a hardware or software-based solution.

90% Of Companies Underestimate The Volume Of Malicious Software

90% Of Companies Underestimate The Volume Of Malicious Software

.

In regions like North and South America, Western Europe and Asia-Pacific, the percentage of companies with accurate estimates ranged from 5 percent - 7 percent.

India Sets Up Elaborate System To Tap Phone Calls, E-mail

India Sets Up Elaborate System To Tap Phone Calls, E-mail

.

India has launched a wide-ranging surveillance program that will give its security agencies and even income tax officials the ability to tap directly into e-mails and phone calls.

Hacking Threat And Tougher Data Laws Promise Insurance Boom

Hacking Threat And Tougher Data Laws Promise Insurance Boom

.

For European insurers frustrated that "cyber crime" policies have so far failed to find a ready market among skeptical companies, hope may be at hand.

New COBIT 5 Guide Identifies Top Three Cyber Security Game Changers

New COBIT 5 Guide Identifies Top Three Cyber Security Game Changers

.

ISACA's latest guide, Transforming Cybersecurity Using COBIT 5, examines the impact of these game changers and how to manage and transform security by using COBIT 5.

Over 20% Of All Phishing Attacks Mimick Banks: Kaspersky

Over 20% Of All Phishing Attacks Mimick Banks: Kaspersky

.

The study, which is based on data from the Kaspersky Security Network cloud service, shows that what was once a subset of spam has evolved into a rapidly growing cyber threat in its own right.

India 3rd Most Targeted Country By Phishing Attacks On Brands: Report

India 3rd Most Targeted Country By Phishing Attacks On Brands: Report

.

Brands in the U.S., UK, India, Brazil and Australia were targeted by almost 54 percent of phishing attacks in April.

Most Data Breaches Caused By Human And System Errors: Report

Most Data Breaches Caused By Human And System Errors: Report

.

While external attackers and their evolving methods pose a great threat to companies, the dangers associated with the insider threat can be equally destructive and insidious.

2013: Year Of Increased Attacks On Android Apps

2013: Year Of Increased Attacks On Android Apps

.

Amit Nath, Country Manager, India & SAARC, Trend Micro shares his views on the security priorities that CIOs should keep in mind in 2013. He also touches upon the security trends for 2013.

VASCO, AET Join Forces To Launch A Concerted PKI Product

VASCO, AET Join Forces To Launch A Concerted PKI Product

.

This partnership will be offered in different markets and regions worldwide, hence broadening and strengthening AET's and VASCO's position in the market.

ESET Launches ESET Security For Microsoft SharePoint Server 2013

ESET Launches ESET Security For Microsoft SharePoint Server 2013

.

Companies using ESET Security for Microsoft SharePoint Server are secured with real-time protection of the entire server operating and also the file system.

It's Time For Cos To Create An Exit Strategy For Mgmt Of Personal Data: Gartner

It's Time For Cos To Create An Exit Strategy For Mgmt Of Personal Data: Gartner

.

Organisations should create a privacy program that keeps personal data not only at arm's length, but under control, according to Gartner.