Inside the Briefcase


Security Engineering Explained

Security Engineering Explained

To design, build, and deploy secure applications, you must integrate security into your application development life cycle by including specific security-related activities in your current software engineering processes.





Briefcase Highlights


DATA SECURITY

IT Briefcase Exclusive Interview: Balancing the IT Security Act with Geoff Webb, NetIQ

November 19, 2012 No Comments

Geoff Webb NetIQIn this interview, Geoff Webb from NetIQ outlines ways in which organizations can increase the speed with which they react to IT security breaches, and safely gain access to resources and mission-critical applications without putting their enterprise at risk. Read More >>>

Symantec Intelligence Report: October 2012

November 16, 2012 No Comments

Welcome to the October edition of the Symantec Intelligence report, which provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through October 2012.

McAfee Threats Report Shows Global Expansion of Cybercrime

November 16, 2012 No Comments

Nov. 14, 2012 – McAfee today released the McAfee Threats Report: Third Quarter 2012, which explores techniques in cybercrime as well as the global evolution of cyber exploits. The latest report uncovers new details of “Operation High Roller,” tracks that mobile malware almost doubled the previous quarter’s total, and reveals an all-time high in database breaches. McAfee Labs also saw jumps in some categories of malware, including ransomware and signed binaries. Rootkits and Mac malware continue to rise, while password-stealing Trojans and AutoRun malware also trended strongly upward.

IT Briefcase Exclusive Interview: A Holistic Approach to IT Security with Jack Danahy, IBM Security Systems Division

November 14, 2012 No Comments

By Jack Danahy, IBM Security Systems DivisionIn this interview, Jack Danahy from IBM Security Systems Division outlines ways in which organizations can begin to overcome security obstacles, and emphasizes the importance of taking a holistic approach to fighting the IT Security battle. Read More >>>

SolarWinds Website Performance Monitoring Solution Supports Sysadmins During Peak Online Shopping Season

November 13, 2012 No Comments

SolarWinds (NYSE: SWI) a leading provider of powerful and affordable IT management software, today announced enhancements to its web application monitoring product SolarWinds Web Performance Monitor (WPM), formerly known as Synthetic End User Monitor (SeUM), just in time as systems administrators prepare for increased holiday online shopping demand.

Symantec’s Digital Information Index Reveals Half of Business Information Resides Outside the Firewall

November 13, 2012 No Comments

Symantec (Nasdaq: SYMC) today launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. The 2012 State of Information Report (LINK) reveals the benefits but also growing challenges of “information sprawl” as organizations increase the level of information stored and accessed outside of the firewall.

LIVE WEBCAST: Leveraging Analytics to Drive Smarter Safety and Security

November 13, 2012 No Comments

This session will discuss and demonstrate how Video correlation and analysis suite (VCAS) from IBM provides the ability to view, monitor and digitally record activity throughout your environment with real-time access to your critical security information.

IT Briefcase Exclusive Interview: Security Awareness Training – A Modern Necessity, with Stu Sjouwerman, KnowBe4

November 11, 2012 No Comments

By Stu Sjouwerman, KnowBe4In this interview, Stu Sjouwerman from Knowbe4 (amply named for its purpose), emphasizes the importance of security awareness training, and outlines ways in which organizations can properly arm themselves for the battle against social engineering and malware threats today. Read More >>>

IT Briefcase Exclusive Interview: Fighting the Online Security Battle with Audian Paxson, Critical Watch

November 9, 2012 No Comments

By Audian Paxson, Critical WatchIn this interview, Audian Paxson from Critical Watch outlines security threats that businesses are facing today, as well as measures that can be taken to help organizations efficiently fight the online security battle. Read More >>>

Ransomware: How to Earn $33,000 Daily

November 8, 2012 No Comments

Ransomware is a type of malicious software that disables the functionality of a computer in some way and demands a ransom in order to restore the computer to its original state. Recent variants use law enforcement imagery to add legitimacy to the warning messages. The malware uses geo-location services to determine the location of the computer it is running on and then, after locking the computer displays a message appropriate to that country. The message usually claims that the user has broken the law by browsing some illegal material. Figure 1 is an example of a ransomware variant that displays a message claiming to be from the FBI.

The BYOD Security Commandments

November 5, 2012 No Comments

If the acceptance of the bring your own device (BYOD) trend in Australia could be transposed into the five stages of grief, we’d be at the bargaining stage. That’s how enterprise software outfit NetIQ’s APAC product and business manager for identity, security & governance, Ian Yip describes the current situation.

New Study Reveals Healthcare Industry Subject to Cybercrime—KnowBe4’s Security Training Prevents Attacks

November 5, 2012 No Comments

According to the Verizon 2012 and 2011 Data Breach Investigations Reports (DBIR), businesses can get a glimpse of how cybercrime is affecting their industry. Stu Sjouwerman, CEO and founder of KnowBe4 (www.knowbe4.com), a security awareness training firm, responds to the healthcare industry findings, and encourages companies to take precautions by implementing employee training designed to prevent cybercrime.

Xerox, McAfee Demo Industry-First Method for Protecting Print Devices, Data from Malware

November 5, 2012 No Comments

Today Xerox (NYSE: XRX) and McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software, a sophisticated filtering method that allows only approved programs to get through. And while malware threats are most often associated with personal computers, Xerox demonstrated to attendees at the McAfee FOCUS 12 security conference that any networked device is vulnerable.

Benefits of Security and Acceleration

November 1, 2012 No Comments

Don MacVittie, F5 NetworksThe performance of web applications defines an organization. Whether external applications that drive customer research and purchasing or internal applications that keep the entire organization moving forward, performance is critical. Read More >>>

Litéra Surveys Examine Mobile Device Usage, Document Security and Collaboration Landscape

November 1, 2012 No Comments

Litéra, the leading provider of content lifecycle, collaboration and risk management solutions, today announced the company has launched two global surveys. One survey measures the impact mobile device usage has on business risk, and the other survey assesses how document collaboration tools affect business productivity.

IT Briefcase Exclusive Interview: Tackling Today’s Security Challenges with Toralv Dirro of McAfee

October 30, 2012 No Comments

Toralv Dirro, McAfeeIn this interview, Toralv Dirro from McAfee offers expert advice on how to evade these dangerous threats and overcome security challenges that organizations are facing today. Read More >>>

Salesforce, Cloud File Sharing and Syncplicity

October 30, 2012 No Comments

The news that Salesforce.com will be getting into the file sharing business comes as no surprise – of course Marc Benioff and team know that their users need access to their files from their preferred applications. It makes perfect senses to us that any cloud-based application vendor, especially in CRM, would provide its users better ways to leverage the cloud to access and share files and collaborate. Arguably, Salesforce has already been in the market for some time, and there is no question that the market for business-grade file access and sharing is taking off.

Securing the Private Cloud

October 25, 2012 No Comments

The rise of public cloud computing and its adoption by enterprises of all sizes is presenting challenges to professionals who are charged with the security of the organization’s data.

IBM Addresses Security Challenges of Big Data, Mobile and Cloud Computing

October 18, 2012 No Comments

In a move designed to reduce the biggest security inhibitors that organizations face in implementing cloud, mobile and big data initiatives, IBM (NYSE: IBM) today announced a broad set of security software to help holistically secure data and identities.

ManageEngine Strengthens Password Manager Pro with Session Recording

October 11, 2012 No Comments

ManageEngine, the real-time IT management company, today announced the immediate availability of session recording capabilities in its privileged password management software, Password Manager Pro. Now, privileged sessions launched from Password Manager Pro can be video recorded, archived and played back to support forensic audits and let enterprises monitor all actions performed by privileged accounts during privileged sessions.

IT Briefcase Exclusive Interview: Improving Endpoint Management with Justin Strong, Novell

September 28, 2012 No Comments

The evolution of BYOD (Bring Your Own Device) has allowed employees today to be more flexible as far as where and when they work. In the below interview, Justin Strong from Novell outlines the many benefits of BYOD and how to overcome the security challenges that companies may encounter within this new working model.

IBM X-Force 2012 Mid-Year Trend and Risk Report: Rising Attacks Focus on Browsers and Social Media Networks

September 20, 2012 No Comments

IBM (NYSE: IBM) today released the results of its X-Force 2012 Mid-Year Trend and Risk Report, which shows a sharp increase in browser-related exploits, renewed concerns around social media password security, and continued disparity in mobile devices and corporate “bring your own device” (BYOD) programs.

Bitdefender verified as Citrix Ready for Citrix VDI-in-a-Box

September 20, 2012 No Comments

Bitdefender, an award-winning provider of innovative security solutions, today announced that Security for Virtualized Environments (SVE) has been verified as Citrix Ready® for Citrix VDI-in-a-Box™. As part of the Citrix Ready program, Bitdefender is now a validated and recommended third-party security solution to help Citrix customers increase their security posture across multiple platforms including VDI-in-a-Box, Citrix XenDesktop® and Citrix XenServer®.

Security Engineering Explained

September 13, 2012 No Comments

To design, build, and deploy secure applications, you must integrate security into your application development life cycle by including specific security-related activities in your current software engineering processes.

Barracuda Networks Launches Business Unit to Support Enterprise Solutions

September 12, 2012 No Comments

Barracuda Networks Inc. today announced the new Barracuda Enterprise, a strategic business unit dedicated to delivering enterprise-class security solutions to large organizations. Barracuda Networks has appointed Michael Van Bruinisse as general manager and vice president of the business unit.

Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

September 7, 2012 No Comments

You may know what a VPN, or Virtual Private Network, is; you probably don’t use one. You really should be using a VPN, and even if you don’t think so now, at some point in the future you may consider it as important as your internet connection.

IT Briefcase Exclusive Interview with Bertrand Hazard on Optimal Patch Management

September 6, 2012 No Comments

When it comes to patch management, we’re hearing about three major challenges from our customers right now. The first is that of patching third party applications. While there is a lot of information on Microsoft patches, there is little shared knowledge on how to patch third party apps; one of the major risks to organizations is from the applications that users download. Read More >>>

Savvis Announces Enterprise Cloud Ecosystem Program

August 30, 2012 No Comments

Savvis, a CenturyLink company (NYSE: CTL) and leader in global cloud infrastructure and hosted IT solutions for enterprises, today announced details of its new Savvis Enterprise Cloud Ecosystem Program, which brings additional flexibility to Savvis’ enterprise cloud computing environment through partnerships with innovative cloud technology providers.

Bitdefender Relaunches Clueful as Free Social Web-Guide on iOS App Behavior

August 30, 2012 No Comments

Bitdefender, the award-winning provider of innovative antivirussolutions, today announced the relaunch of Clueful, the first security application to empower iPhone owners to distinguish privacy violating apps. Replacing the controversially removed iOS App Store version, Clueful returns as a free web-app globally.

Companies Still Struggling with Cloud Security: Reported Higher Incidence of Data Security Lapse or Issue From 2011

August 29, 2012 No Comments

Globally, the cloud continues to pose challenges on how to deliver agile, yet secure, IT services to enterprises. The percentage of companies that reported a data security lapse or issue with their cloud service increased from 43 percent in 2011 to 46 percent in 2012, according to a recent global cloud security survey conducted by Trend Micro (TYO: 4704;TSE: 4704), the global leader in cloud security.

ADVERTISEMENT

DTX ExCeL London

WomeninTech