Inside the Briefcase


3 Enterprise Security Bugaboos That Are Only Getting Worse

Tweet Enterprises are under constant attack from security threats of all stripes, but three in particular will likely come to the forefront in the second half of 2011. The growth of mobile devices will present an ever-wider opportunity for...

Secure Processing in the Mobile Age

Secure Processing in the Mobile Age

Movement towards the mobile enterprise is gaining momentum based on the clear business value afforded by better leveraging today’s increasingly disconnected and on-the-go workforce.





Briefcase Highlights


DATA SECURITY

Scotland Yard Tightens the Pincers on Anonymous

September 9, 2011 No Comments

Tweet SOURCE: TechNews World It’s been another wild and crazy week for the security community. Scotland Yard arrested two suspected members of Anonymous and LulzSec Thursday. Meanwhile, the major players in the browser market — Google (Nasdaq: GOOG), Microsoft (Nasdaq: MSFT) and the Mozilla Foundation — have chopped Dutch certificate DigiNotar off at the knees, […]

Wikileaks Gets a Taste of Its Own Medicine

September 2, 2011 No Comments

Tweet SOURCE: TechNewsWorld Another global security mess is in the making, on the heels of the publication of thousands of sensitive security documents obtained by WikiLeaks. However, in this particular instance, Wikileaks insists it didn’t mean to do it. Last week, WikiLeaks reportedly made some 134,000 diplomatic cables available. Unlike earlier disclosures, though, these cables […]

The Next New Cyberdefense Strategy: Monitor Everything

August 29, 2011 No Comments

Tweet SOURCE: TechNewsWorld Monitoring the traffic coming through the website has become critical in the cybersecurity space. It is impossible to determine ahead of time which page or Web functionality will be used by the criminals. Instead of trying to predict where the criminals will hit or plug every hole, a better approach is to […]

Video Clip Reveals Possible Chinese State-Sponsored Hack Attack

August 26, 2011 No Comments

Tweet SOURCE: TechNewsWorld A Chinese government-produced documentary has drawn suspicion for including a brief moment of footage that appears to show Chinese hackers attacking a U.S. website. There’s been a long-running assumption that China has advanced hacking skills, according to analyst Rob Enderle; however, “all developed nations have both offensive and defensive capabilities in this […]

Beware of Internet Job Hunting Scams

August 24, 2011 No Comments

Tweet As the unemployment rate in the US continues to rocket towards the sky, more and more people are turning to the Internet to search for job opportunities. Offering tools that allow the individual to narrow down their job search and cover specific geographic areas, the Internet provides very useful methods for helping people find […]

Is Online Security a Modern Day Myth?

August 19, 2011 No Comments

Tweet There is no question that online security is a hot topic these days. Ranging from large entities like Google and Facebook to our every day personal email accounts, it seems that no one is safe. Even if we are able to research and invest in top of the line security software, it appears that we are still […]

Internet Security Alliance chief attacks Obama cybersecurity plan

August 17, 2011 No Comments

Tweet The head of the Internet Security Alliance (ISA), a coalition of Internet companies and researchers, is blasting the Obama administration’s cybersecurity proposal for focusing too much on regulating and punishing companies rather than on improving cybersecurity. Read more…

Is InfoSec Ready for Big Data?

August 15, 2011 No Comments

Tweet “Big data” is the logical outgrowth of increased use of virtualization technology, cloud computing and data center consolidation. What organizations are finding as they centralize resources like storage is that they’ve produced quite a lot of data — in some cases, even exabytes of data. We’re seeing scenarios play out where traditional security tools […]

Half-Pint Hackers and Rats in the Walls

August 10, 2011 No Comments

Tweet The security world was rattled recently with the revelation of what McAfee called “Operation Shady Rat,” a widespread data theft racket. The company’s rivals, though, had a somewhat different takes on the situation. Meanwhile, some security researchers educated kids about the wild and wonderful world of hacking, while others proved how much you can […]

McAfee Smells a Rat

August 5, 2011 No Comments

Tweet “Operation Shady Rat” is what McAfee is calling the years-long series of cyberintrusions and data theft incidents the security vendor claims to have recently uncovered. The company says it came across the information in a command and control server that it accessed five years ago. Apparent victims are all over the world, and they […]

Seeking Tomorrow’s Security Solutions Today, Part 2

July 29, 2011 No Comments

Tweet Many security failures are not due to problems with the technology, said Francis Brown, managing partner at Stach & Liu. Focusing on new technologies and hoping for a new silver bullet that will “radically reshape” the state of information security is “a distraction,” he said, “not a step in the direction of actually addressing […]

Seeking Tomorrow’s Security Solutions Today, Part 1

July 21, 2011 No Comments

Tweet Traditional security solutions have lately seemed helpless against aggressive, highly competent hackers. “This is the nature of security,” said MAD Security’s Mike Murray. “Ten years ago, you could have replaced NFC, mobile devices and the consumerization of IT with terms like Bluetooth, wireless networks, ubiquitous camera phones and text messaging. Security should always be […]

5 Things You Can Do Right Now to Boost Your Social Engineering Immunity

July 19, 2011 No Comments

Tweet Social engineering can be an amazingly effective weapon in the hands of a malicious attacker, but too often it’s not regarded as an enterprise weakness that IT is responsible for fixing. This is not an easy topic to address, but it is a serious issue. Address it with the same attention, careful planning and […]

Cough Up That Encryption Key – or Else!

July 14, 2011 No Comments

Tweet Whether the protection afforded by the Fifth Amendment extends to the refusal to open encrypted computer files is at the center of a potentially precedent-setting case in Colorado. The issue is “not specifically the computer or the email. It’s the encryption,” said EFF staff attorney Hanni Fakhoury. The issue comes down to whether the […]

Silicon Image Selects Oracle to Improve Operational Efficiencies

July 8, 2011 No Comments

Looking to streamline its business intelligence (BI) and identity management initiatives, Silicon Image (News – Alert) has implemented Oracle Business Intelligence Foundation and Oracle Identity Management, two key components of Oracle Fusion Middleware.

3 Enterprise Security Bugaboos That Are Only Getting Worse

July 8, 2011 No Comments

Tweet Enterprises are under constant attack from security threats of all stripes, but three in particular will likely come to the forefront in the second half of 2011. The growth of mobile devices will present an ever-wider opportunity for hackers, the desktop browser will become a new security perimeter, and attackers will learn new social […]

DATA SECURITY, Featured Articles, Inside the Briefcase

Secure Processing in the Mobile Age

June 29, 2011 No Comments

Movement towards the mobile enterprise is gaining momentum based on the clear business value afforded by better leveraging today’s increasingly disconnected and on-the-go workforce.

Two-Headed Hacker Monster Declares Open Season on Governments

June 22, 2011 No Comments

Tweet LulzSec and Anonymous, two of the most high-profile hacker groups in the world, have teamed up to focus their attentions on exposing the secrets of the world’s governments. These groups are following the lead of WikiLeaks in “trying to discourage the tendency of governments to gather too much information and keep too much of […]

Breaches Everywhere: 5 Ways to Soften the Blow When It Happens to You

June 22, 2011 No Comments

Tweet IT organizations naturally want to put a great deal of resources behind intrusion protections, as well they should. But investment in preventative controls can only take us so far. There always exists a chance that a breach can occur. For this reason, some resources should also be directed to systems designed to lessen the […]

Senators’ Bill Would Muzzle the Tracker in Your Pocket

June 17, 2011 No Comments

Tweet A new bill introduced by Senators Al Franken and Richard Blumenthal would mandate stringent notification and consent policies for devices used to track their owners’ whereabouts. Popular gadgets like smartphones are capable of telling third parties where they’re located at any given time; if passed, the legislation would tighten their privacy policies, which most […]

Privacy Orgs Take Facebook Facial Face-off to FTC

June 15, 2011 No Comments

Tweet The Electronic Privacy Information Center is leading a group of privacy advocate groups in filing a complaint with the FTC over Facebook’s use of facial recognition technology. Facebook’s Tag Suggestions feature, which gained significant attention last week, automatically determines the identities of people in uploaded photos and suggests names the uploader can use to […]

Android Market’s Malware Flood Level Rises With Plankton Surge

June 15, 2011 No Comments

Tweet The Android Market’s malware woes continue with a new wave of malicious software that uses an exploit researcher Xuxian Jiang dubs “Plankton.” Google has once again removed the apps in question and has reiterated its promise to ban developers who break its rules. Some security experts have questioned whether Google’s stance should be more […]

Market Overview: Privileged Identity Management

June 13, 2011 No Comments

Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. In the past, controlling distribution of passwords to these environments was enough, but today, auditors have started to pay much closer attention to what administrators actually do in these environments.

DATA SECURITY, Featured White Papers, Top Stories

Independent Research Report: Build Security Into Your Network’s DNA: The ZeroTrust Network Architecture

June 13, 2011 No Comments

By John Kindervag – Forrester Research, Inc. This report is a deep dive into a potential way in which you could use the concepts of the Zero Trust Model and conceivably implement them in a real-world environment.

Facebook Facial Recognition Creeps Out Privacy Partisans

June 9, 2011 No Comments

Tweet Facebook has raised concerns among privacy proponents with Tag Suggestions, a new feature that uses facial recognition technology to connect names to faces in uploaded photos and suggest tags to the uploader. Aside from the general privacy worries the feature has spurred, it’s somewhat unclear just how long Facebook has had this feature in […]

Riverbed Expands Cloud Storage Gateway Product Family with New Appliance Models

June 9, 2011 No Comments

Riverbed Technology (NASDAQ: RVBD), the IT performance company, today announced the introduction of three new Riverbed® Whitewater™ cloud storage gateway models designed to optimize data protection. Whitewater will now allow a wider range of organizations, including small and medium businesses (SMBs), to take advantage of the benefits of cloud data protection

Sony and the Rise of the Hacker Hordes

June 7, 2011 No Comments

Tweet It’s becoming difficult to count the exact number of times various Sony systems have been attacked and hacked over the last couple of months. Malicious hackers targeting corporations isn’t a new phenomenon, but what’s unusual about Sony’s case is the repetitive nature of the attacks. Hackers are ganging up and concentrating their efforts, and […]

Hacker attacks threaten to dampen cloud computing’s prospects

June 3, 2011 No Comments

Tweet The recent high-profile hacking of Google’s Gmail service and Sony’s Playstation gaming network is threatening to slow the take-off of the next big thing in the computing space – the cloud. Computer companies will need to collaborate to work on addressing security issues to boost confidence in cloud computing, where data and software is […]

Sniffing Out a Scam: Real-Time Detection’s Role in Battling Data Breaches

May 31, 2011 No Comments

Tweet Allowing compromised accounts to run rampant in your infrastructure fundamentally damages your business and the trust your clients put in you. Because content and reputation can change in real time, the only truly effective way to monitor a live system is by monitoring both behavior heuristics and the live stream of mail that you’re […]

ADVERTISEMENT

DTX ExCeL London

WomeninTech