Security News - Page 9

Sophos Strengthens Its Network Security Offerings

Sophos Strengthens Its Network Security Offerings

.

Unveils two enhanced UTM appliances, Sophos UTM 525 and 625 and the Sophos RED 50.

Employees Steal Corporate Data And Don't Believe It's Wrong

Employees Steal Corporate Data And Don't Believe It's Wrong

.

Half of employees who left or lost their jobs in the last 12 months kept confidential corporate data, according to Symantec, and 40 percent plan to use it in their new jobs.

Cos Beyond Certain Size And Complexity Need A Full-Time CISO

Cos Beyond Certain Size And Complexity Need A Full-Time CISO

.

A CISO is someone who understands security with all its ramifications and not just someone promoted from another domain to fill in the shoes, says Sundar Ram Gopalakrishnan.

M2M Dream Challenged By Alarming Security Concerns

M2M Dream Challenged By Alarming Security Concerns

.

A number of M2M vendors have already started putting more emphasis on M2M application security in a bid to anticipate future market opportunities, finds ABI Research.

CA Technologies Leads Magic Quadrant For Content-Aware DLP

CA Technologies Leads Magic Quadrant For Content-Aware DLP

.

Gartner positions vendors in the Leaders quadrant based on their completeness of vision and ability to execute.

Best Practices To Help BFSI Deal With Cyberfraud

Best Practices To Help BFSI Deal With Cyberfraud

.

VASCO shares some best practices that will help the BFSI sector deal with recent cybersecurity threats.

Volume Of High-Risk Android Apps Will Hit 1 Mn In 2013

Volume Of High-Risk Android Apps Will Hit 1 Mn In 2013

.

Malware targeting Android up sixfold during Q3, with viruses possibly able to feed information from the likes of banking apps, warns Trend Micro.

Hackers Breached Security Firm Bit9, Then Attacked Its Customers

Hackers Breached Security Firm Bit9, Then Attacked Its Customers

.

The hackers accessed a system that Bit9 said it uses to digitally sign its software to let customers know it is safe to run on their computers.

Oil & Gas Cos To Spend $1.87 Bn In Cybersecurity By 2018

Oil & Gas Cos To Spend $1.87 Bn In Cybersecurity By 2018

.

The lack of appropriate security has already allowed a number of destructive cyber-attacks to lay waste to some of the most high-profile companies in the industry, says ABI Research.

Sanovi Technologies Unveils New Release Of Its DR Solution Suite

Sanovi Technologies Unveils New Release Of Its DR Solution Suite

.

This release also integrates with privileged identity management software such as CyberArk to address the increased security concerns prevailing in enterprises today.

Microsoft, Symantec Disrupt Cyber Ring, Halt Searches

Microsoft, Symantec Disrupt Cyber Ring, Halt Searches

.

They disrupted a global cybercrime operation by shutting down servers that controlled hundreds of thousands of PCs.

BlackBerry Works With Trend Micro To Expand Protection For Customers

BlackBerry Works With Trend Micro To Expand Protection For Customers

.

BlackBerry to use Trend Micro's app scanning service to further analyse apps submitted to BlackBerry World.

Co's Data Security Plan Has National Implications

Co's Data Security Plan Has National Implications

.

Kamlesh Bajaj, CEO, DSCI talks about its initiative with the government and how data protection should not be restricted as an enterprise priority but become a national initiative.

Employees' Online Behaviour Biggest Enterprise Security Threat

Employees' Online Behaviour Biggest Enterprise Security Threat

.

Cisco research reveals mainstream threats that are magnified by the world's next generation of workers' online behaviour.

Federated Single Sign-On Will Be Predominant SSO Tech By 2016: Gartner

Federated Single Sign-On Will Be Predominant SSO Tech By 2016: Gartner

.

Mobile devices pose latest challenge to authentication and SSO, finds Gartner.

Websense Leads Gartner Magic Quadrant For Content-Aware DLP

Websense Leads Gartner Magic Quadrant For Content-Aware DLP

.

The company advanced in the "ability to execute" category between the 2011 and 2013 reports.

Researchers Warn Of Widespread Networking Gear Bugs

Researchers Warn Of Widespread Networking Gear Bugs

.

Bugs in widely used networking technology expose tens of millions of personal computers, printers and storage drives to attack by hackers over the regular Internet.

RSA Leads Gartner Magic Quadrant For Content-Aware DLP

RSA Leads Gartner Magic Quadrant For Content-Aware DLP

.

This marks the fifth consecutive time that RSA has been placed in the DLP "Leaders" quadrant.

DLP: Discover First Or Monitor First?

DLP: Discover First Or Monitor First?

.

Sorry, but "IT DEPENDS". As many tough questions in life, this one has no single right answer.

RSA Introduces Integrated BC/DR And Crisis Mgmt Solution

RSA Introduces Integrated BC/DR And Crisis Mgmt Solution

.

RSA Archer solution and mobile app helps customers prepare for and minimise impact of business disruptions.

Cyber-Ark Launches Solution To Secure Privileged Accounts On UNIX

Cyber-Ark Launches Solution To Secure Privileged Accounts On UNIX

.

New privileged session management capability addresses insider and advanced threats with security and auditing of SSH sessions.

ArrayShield IDAS Two Factor Authentication To Protect Servers In The Cloud

ArrayShield IDAS Two Factor Authentication To Protect Servers In The Cloud

.

Two-factor authentication protects against intruders and secures mission-critical business operations.

NetIQ Leads Gartner Magic Quadrant For User Administration And Provisioning

NetIQ Leads Gartner Magic Quadrant For User Administration And Provisioning

.

Report highlights shift to include identity and access governance to meet business needs.

Android Malware Potentially Infects Thousands Of Devices Stealing Personal Data

Android Malware Potentially Infects Thousands Of Devices Stealing Personal Data

.

Fake market called Android Express's Play has drawn over 3,000 visits in a week, resulting in potential theft between 75,000 and 450,000 pieces of personal info.

McAfee Outlines Strategy For Future Of Business Security

McAfee Outlines Strategy For Future Of Business Security

.

McAfee has announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better protection.

Cos Struggling To Implement Information Retention Plans

Cos Struggling To Implement Information Retention Plans

.

The perceived cost of implementing their plans is reported to be the most common reason why organisations are lagging in plan implementation.

India Setting Up Cyber Security Architecture: NSA

India Setting Up Cyber Security Architecture: NSA

.

The proposed architecture will involve monitoring, certification and assurance of networks by designated agencies and bodies in accordance with the law.

Dealing With InfoSec Budget Cuts

Dealing With InfoSec Budget Cuts

.

Tom Scholtz, VP Distinguished Analyst, Gartner speaks on dealing with security budget cuts and expanding the definition of ROI with respect to InfoSec initiatives.

Spam Levels Hit Five-Year Low

Spam Levels Hit Five-Year Low

.

According to Kaspersky Lab data, the share of spam in email traffic decreased steadily throughout 2012 to hit a five-year low.

VASCO Adds Virtual Appliance To Its IDENTIKEY Product Range

VASCO Adds Virtual Appliance To Its IDENTIKEY Product Range

.

Virtual appliance offers remote access security.