July 11, 2013
Sims Recycling Solutions, the global leader in electronics reuse and recycling, has released a downloadable white paper providing tips to ensure the data security of retired IT assets. As technologies, such as cloud-based computing, file-sharing applications, and mobile devices, increase employee efficiency and customer convenience, they also make it easier to collect, store, access, and transfer vast amounts of information. From the time data is collected to the time it is destroyed, digital data security has never been more critical.
July 9, 2013
By John Landwehr, AdobeIn this interview, John Landwehr from Adobe outlines top national security threats to desktops, laptops, tablets, and smartphones, and ways in which Adobe working to help businesses fight this security battle. Read More >>>
July 1, 2013
By Linda Park, Symantec Corp.Data breaches are serious problems, costing some businesses millions of dollars in damages each year. But knowing these threats exist is one thing; understanding them is another. Read More >>>
June 28, 2013
By Alex Balan, BullguardIn this interview, Alex Balan from Bullguard outlines the primary security threats that both users and businesses are facing online today, and offers expert advice for avoiding the “dark corners” where hackers may be lurking.Read More >>>
June 13, 2013
IT pro and former National Security Administration (NSA) analyst, Edward Snowden, recently leaked word of the NSA’s blanket surveillance programs – the “whistleblower” reportedly detailed the NSA’s practice of secretly obtaining court orders to track telephone calls and emails. According to a new Washington Post survey, a majority of Americans agree with the NSA’s security procedures.
June 11, 2013
Customers must take back control of their data.
June 10, 2013
Digital crime is on the rise—a type of crime in which your credit, financial security and good name are at risk. Identity theft is now considered to be one of the fastest-growing crimes in America, made worse by the fact that criminals do not discriminate—cybercriminals are now targeting children. As cybercriminals begin focusing their efforts on 6 to 16 year-olds, Internet security awareness training firm KnowBe4 (www.knowbe4.com) advises parents to take the threat seriously and to quickly enact safety measures to limit risk for their children.
June 6, 2013
Kroll Ontrack, the leading provider of data recovery, ediscovery and information management products and services, today announced five of the most common IT administrator mistakes that can lead to data loss. Given the complexity and capacity of advanced storage devices and the criticality of organizational data, documentation and best practice implementation are critical when it comes to protecting data.
June 6, 2013
Symantec Corp. (Nasdaq: SYMC) and the Ponemon Institute today released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent higher than other industries.
June 3, 2013
McAfee Labs today released the McAfee Threats Report: First Quarter 2013, which reported a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam. McAfee Labs also saw continued increases in the number and complexity of targeted threats, including information-gathering Trojans and threats targeting systems’ master boot records (MBRs).
May 29, 2013
McAfee today announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee® ePolicy Orchestrator® (McAfee ePO™) platform. With McAfee EMM software, comprehensive security, policy, and management capabilities are extended to mobile devices. McAfee ePO software enables enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single, unified infrastructure and console.
May 29, 2013
SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, today outlined the three main drivers of network complexity – changing New Technologies, IT Operations and Business Operations – that many IT professionals face as they get their jobs done and provided best practices to help manage the chaos today and tomorrow.
May 20, 2013
The word “chargeback” is enough to have many online merchants cowering in fear. Chargebacks, which occur when consumers dispute purchases made with their credit cards, are now a detrimental aspect of e‑commerce and the cause of imbalance in the industry.
May 16, 2013
By Blake Pappas , Experts reveal that over 64 million blogs incorporate Wordpress software. Therefore, when the announcement was made recently that Wordpress had been successfully hacked, the world paid attention. Read More >>>
May 15, 2013
Mobile file access ready to be SCARED secure!
May 6, 2013
According to National Security Advisor Tom Donilon, cybercrime has now overtaken terrorism as the number one threat to United States security. This assessment from America’s most senior intelligence leaders noted that the rapid pace of new technological developments makes it difficult for security experts to keep up with hackers and new forms of malware.
May 1, 2013
IT Security can overwhelm even the most seasoned security expert when headline-grabbing threats like Spamhaus DDoS are brought to the forefront by media. SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, today outlined six security threats that many IT professionals never think they’ll face (until they do) and provided best practices to help prevent and manage unwanted threats from becoming a reality.
April 18, 2013
Hitachi Data Instance Manager Provides a Holistic View and Management of Data Copies, Lowers Costs and Enhances Effectiveness of Data Protection
April 18, 2013
One of the biggest challenges facing online merchants today is a rapidly growing trend in the realm of Internet sales fraud. Scammers have recently chosen a new route to fool businesses—“friendly fraud,” an illegitimate type of chargeback or card dispute. “Friendly fraud” consists of consumers making an online purchase and then contacting their bank, stating that the transaction was not their doing, resulting in a chargeback. Chargebacks911, a company established by a former online retailer that specializes in servicing merchants, consumers and the majority of banking institutions, handles “friendly fraud” and other chargeback issues to quickly resolve disputes between cardholders and merchants.
April 15, 2013
Do hackers writing malware-stuffed links in search results find a way to avoid Google’s search bots? That may explain a new report from a German security firm evaluating the safety of results returned by some of the world’s top search engines, including Google, Bing, Baidu and Yandex. The news isn’t good for Bing, but the search engine says it’s working hard to find those poisoned links and sniff out hackers when they use SEO techniques.
April 9, 2013
Daniel Joseph Barry, NapatechThree recent trends in the IT industry have improved the efficiency and effectiveness of digital services: cloud computing, big data analysis and mobility. Unfortunately, this also provides cybercriminals with fewer, and more valuable, targets. Read More >>>
April 1, 2013
n the past four years there have been several major cyber attacks against South Korea. We have identified a particular back door (Backdoor.Prioxer) that surfaced during the 2011 attacks. A modified version of this back door was also discovered during the 2013 attacks. The back door is based on publicly available code, but there are some indications that the same individuals are responsible for the 2011 and 2013 versions, pointing towards a possible connection between the two attacks.
March 29, 2013
By Raj Sabhlok, ManageEngineWith March Madness underway, IT teams across the country are feeling the impact of the NCAA basketball tournament games streaming on their companies’ networks. Read More >>>
March 21, 2013
By and large, datacenters have aggressively jumped on the flash-storage bandwagon and have ditched archaic hard disk data storage devices. The problem is that many organizations focus on the significant read functions of these high-speed drives, and haven’t spent too much time considering the write limitations of SSDs. To be clear, these limitations are fairly miniscule in the grand scheme of things, as they can be worked around. But at the very least, especially if you’re new to the solid state storage game, you’ll need to understand these limitations. Read More >>>
March 21, 2013
SpiderOak was built from the ground up with privacy as its core value. While much attention is paid to security breaches and the vulnerability of data, there is a clear differentiation between security and privacy. Data breaches and security failures are a part of online life. SpiderOak is a firm believer in encrypting data from end-to-end so that 3rd party services who store your data never have plaintext access. Privacy is the best form of security.
March 21, 2013
It has been reported in the media that several South Korean banks and local broadcasting organizations have been impacted by a cyber attack. The attack included the defacement of a Korean ISP/telecoms provider and also the crippling of servers belonging to a number of organizations.
March 8, 2013
with Wayne P. DeCesaris, Tangoe Inc.In this interview, Wayne DeCesaris from Tangoe outlines ways in which organizations can overcome the dangers that BYOD brings to the table, and offers expert advice as to how to keep your organization safe and secure. Read More >>>
March 8, 2013
with Toby Rush, EyeVerifyIn this interview, Toby Rush from EyeVerify stresses the importance of mobile device security, and emphasizes the value of biometrics as a next-generation security solution that every organization should consider. Read More >>>
March 6, 2013
Symantec Corp. (Nasdaq: SYMC) has been named one of the World’s Most Ethical Companies by the Ethisphere Institute,
March 4, 2013
On Tuesday, February 26, F5 Networks conducted a survey on the exhibit show floor during RSA 2013. Conference attendees were asked two initial qualifying questions about their role within their organization and how much their job involves the management and implementation of security to ensure the validity of the survey results. More than 150 qualified respondents were then asked a total of five questions surrounding security trends.