The 2012 version of the RSA conference ended the same way it began, busy and full of promise. It seemed to me the aisles were full of attendees and booth staff members were all busy explaining their IT security products.
- By Ralph C. Jensen
- Mar 06, 2012
Lumeta Corp. recently announced the latest release of IPsonar which now includes Enhanced Perimeter Discovery (EPD).
HP has announced an integrated platform of risk-driven security solutions that provides enterprises clear visibility across traditional, mobile and cloud environments, and enables the ability to apply adaptive security defenses based on specific organizational risks.
- By Ralph C. Jensen
- Mar 01, 2012
RSA Conference, the world’s leading information security conferences and expositions, recently announced the honorees of its 15th annual awards program.
Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.
Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.
In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.
- By Terence Martin Breslin
- Mar 01, 2012
The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation.
HID Global recently announced its highly-integrated fraud detection service from its Identity Assurance business, ActivIdentity.
Security takes on a new perspective when looking at the IT side of the aisle. After my first day through the RSA Conference in San Francisco, I have to say Cherry’s FIPS 201 compliant keyboard makes simple look pretty smart.
- By Ralph C. Jensen
- Feb 29, 2012
A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.
StopBadware and Commtouch recently published a joint report titled "Compromised Websites: An Owner's Perspective" that chronicles webmasters' experiences with hacked websites. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage.
Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.
Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.
With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.
It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.
- By Ralph C. Jensen
- Feb 23, 2012
Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.
January saw malware attacks targeting a wide range of potential victims, including gamers looking for a Pro Evolution Soccer 2012 game crack, small business owners concerned about the reputation of their business, and government organizations receiving spoofed messages from the United States Computer Emergency Readiness Team (US-CERT).
In an upcoming article from the Human Factors and Ergonomics Society (HFES), human factors/ergonomics researchers identify impediments to efficient password creation and provide design strategies for enhancing the user experience.
Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.
- By Ron Martin
- Feb 01, 2012