Proofpoint Inc., a provider of unified e-mail security and data loss prevention solutions, recently announced that South Dakota Library Network has deployed the Proofpoint Messaging Security Gateway appliance to prevent leaks of confidential information in outbound e-mail messages and to protect its e-mail users from incoming spam and viruses.
Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals.
Scientists may have found a new way to combat the most dangerous form of computer virus.
The method automatically detects within minutes when an Internet worm has infected a computer network. Network administrators can then isolate infected machines and hold them in quarantine for repairs.
Gemalto and McAfee recently introduced a new integrated solution that enables PC and laptop users secure and convenient access to fully encrypted disks through strong, secure, hardware-based, two factor authentication.
Trend Micro recently reported that in the U.S., U.K., Germany and Japan, employees in small companies took more online risks while on the company network compared to their counterparts in larger organizations, according to the results of a study that explores corporate computer users' perceptions of and experiences with security threats.
To avoid becoming the next media headline, healthcare organizations now must demonstrate that they know where their mobile computers are
- By John Livingston
- Jun 01, 2008
Twenty-five million records containing personal information lost by the U.K. tax authority. Personal and confidential health records found on a USB stick by a university student. NATO secrets on a USB stick found in a Stockholm library. Sensitive personal information lost on a flash drive by the Iowa Department of Natural Resources. Fertility treatment information on 3,100 patients lost.
- By Bill Piwonka
- Jun 01, 2008
Secure Computing Corp. recently announced the results of an IT director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for emerging Web-based attacks.
A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an alarming “air of invincibility” when it comes to their companies’ potential exposure to a data breach
In its fifth-annual study of outbound e-mail and content security issues, Proofpoint Inc. found that large enterprises continue to incur risk from -- and take action against -- information leaks over outbound e-mail, as well as newer communications media such as blogs, message boards, media sharing sites and mobile devices.
Symark International recently announced the results of a survey of more than 850 security, IT, HR and C-level executives across all industries. Conducted by eMediaUSA, the survey focused on orphaned accounts -- user accounts that remain active after an employee has left a company -- and the processes organizations have in place to locate and terminate them.
In its Global Threat Report issued recently, ScanSafe reported a 35 percent increase in Web-based malware in April.
A new survey of IT professionals revealed that new regulatory compliance requirements -- for implementing satisfactory technology solutions to address security vulnerabilities, data leakage and compliance -- remain difficult for enterprise organizations to effectively achieve.
It is a conundrum that enterprises and organizations that need to protect their customers’ secure information often must access that secure information to authenticate the identity of a customer. In other words, to prevent a breach, they must risk a breach.
- By Steven Titch
- May 09, 2008
Network access control technologies, a combination of network infrastructure components and security products, are set to become an extension of the network. As common misperceptions are dispelled and NAC gains acceptance as a key part of network security, these technologies become the center of a highly competitive and lucrative market.
Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?
- By Steve Laubenstein
- May 05, 2008
Imagine if 100 people knocked on your front door each day, but fewer than 10 of them were trustworthy. The rest were crooks, con artists and aspiring criminals. That’s the situation facing today’s Internet users. Some skeptics believe there is no stopping bot networks, phishing schemes and digital scams.
- By Daniel Ryan
- May 01, 2008
AirPatrol Corp. recently launched a cell phone detection and location solution to help businesses and governments protect against the unique threats posed by the use of cell phones for fraud, crime and interference with business operations.
Avoiding reputation damage to the organization was viewed as a top priority for security programs by three-quarters of information security professionals surveyed in a worldwide study launched recently by (ISC)².
According to a survey conducted at the HIMSS 2008 Annual Conference and Exhibition, 64 percent of respondents cited “access” as their number one IT security concern, highlighting the importance of controlling user access to clinical systems and applications in healthcare environments.