Purewire Inc., a Web security SaaS vendor, recently announced end-user survey results illustrating severe vulnerabilities to corporate networks due to malware-infected Web applications, remote workers and shrinking IT budgets.
The year 2008 was a time security threats and malicious activity reached a tipping point, and 2009 stands to be the year critical infrastructure systems become prime targets for cyber criminals and the global financial crisis will be exploited for a variety of malicious activities, according to a new report recently released from VeriSign’s iDefense Security Intelligence Services.
Independent research organization Unisphere Research and Vormetric, Inc., recently announced results of the Special Research Report: Data Security and Encryption, including that 96 percent of databases export sensitive data to other systems, including backups, file servers and application log files.
As 2008 -- a year in which a record number of data breaches occurred and over 22 million records were compromised -- comes to a close, Utimaco has unveiled the top economic, legislative and technical trends that it feels will drive the IT security market in 2009.
It would seem desperate times call for desperate measures, as a survey released recently shows that workers will do almost anything to keep their jobs -- but at a cost to the employer.
Napera Networks recently issued the results of an online Network Test that asked 200 small and medium-sized enterprises a series of questions to determine if the corporate networks of the companies are secure and protected from potential threats.
When you think of the NFL, shredding papers and documents is the last thing that comes to mind, unless your former quarterback is moving to a new team. You’re more likely to think of an oversized lineman sacking the quarterback or a fullback rushing for 3 yards in a cloud of dust.
- By Ralph C. Jensen
- Dec 01, 2008
According to a study conducted by Osterman Research and sponsored by Imanami, 42 percent of organizations report unauthorized access of information through Active Directory.
Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.
- By Thomas Varghese
- Nov 18, 2008
Mimecast has found that 50 percent of U.S. companies are at risk of sensitive information leaks by employee e-mails, based on a survey of 500 IT professionals regarding their e-mail archiving and continuity policies.
Palo Alto Networks recently announced the results of a study by the Ponemon Institute examining behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling discovery was that when confronted with a security or privacy breach as a direct result of using an Internet application, 45 percent of employees did nothing and continued using the product.
Mi5 Networks recently announced that Georgian Bank, the second-largest bank headquartered in Atlanta, has selected its Mi5 Webgate appliance to provide gateway protection against Web malware, control Web usage and prevent confidential files from leaking out of the network.
Secure Computing Corp., an enterprise gateway security company, recently announced that Orange County, Calif., has protected its IT network with a unified set of Secure Computing products.
U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election a week away, one important question on people's minds is, what will happen under the next administration?
One of the largest independent banks in America, UMB Financial Corp., (UMB) is implementing Novell identity management solutions on SUSE Linux Enterprise Real Time to streamline user access and increase data security
The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) recently released a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack.
BearingPoint Inc. recently announced that the United States Marine Corps Systems Command has awarded the firm a fixed price contract for an Identity and Access Management (IAM) solution.
Guardium and StarLink, Middle East provider of security and compliance solutions, recently announced that the National Bank of Kuwait (NBK) has successfully implemented Guardium’s enterprise security platform to continuously monitor all database transactions in real-time.
The Georgia Tech Information Security Center (GTISC) recently announced the release of the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.
RSA recently announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in the spring and summer of 2008.