In a global mobile threat study released recently, Juniper Networks found that enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks.
The General Services Administration released an RFQ for cloud computing services. Do you have what they are looking for?
- By Alice Lipowicz
- May 11, 2011
The acquisition will enable the company to meet demands for complete, layered security protection.
The report, produced from research led by eEye cofounder and CTO Marc Maiffret, reveals that simple configuration changes and software version upgrades could mitigate many application vulnerabilities before patches are available.
An excellent starting point for an organization looking at cloud computing platforms is to examine its IT architecture. Only by aligning the architecture – compute, network, data center, power and storage resources – with applications can a company be on the path to achieve the reliability and performance it requires within a cloud environment.
The company will work with the CSA to promote thought leadership and best practices for secure cloud computing.
The eighth annual "What Keeps Network Administrators Up At Night" indicates unease about network security breaches and users respectively are at an all-time high in survey's history.
According to the complaint, "It has been the practice and policy of the Aaron's Defendants to conceal from their customers their ability to remotely access, intercept and monitor customers' private, personal electronic communications, information, screen shots, keystrokes or images captured on webcams and to further disclose to consumers exactly the kinds of private information and images that can be and were routinely collected, transmitted and stored."
U.S. Unisys Security Index finds concern rises to highest levels ever following WikiLeaks incident, new unrest in the Middle East and national and financial security threats.
It probably goes without saying that being a smart person is not a prerequisite for owning a smartphone. Just take a look around you.
- By Ronnie Rittenberry
- May 01, 2011
New company helps businesses examine, repair and develop secure websites.
CA Technologies and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently released a study that shows cloud providers and cloud consumers are not aligned on cloud security. Their conflicting views on focus, priority and responsibility suggest a pending security standoff between cloud providers and cloud users.
SonicWALL Inc., provider of intelligent network security and data protection solutions, today announced that BRAVO BRIO Restaurant Group Inc., has selected the SonicWALL Clean Wireless solution to provide network security and data protection solutions for its 85 high-volume, full-service restaurants in the U.S., including the upscale affordable BRAVO! Cucina Italiana and Brio Tuscan Grille.
Symantec Corp. recently announced the publication of its April 2011 MessageLabs Intelligence Report. This month analysis reveals that targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in London that year.
McAfee and the Center for Strategic and International Studies (CSIS) recently revealed the findings from a report that reflects the cost and impact of cyberattacks on critical infrastructure such as power grids, oil, gas and water.
Regulatory compliance will be the top business issue affecting enterprise information technology (IT) in the next 12 months, according to Top Business/Technology Issues Survey Results, a new survey of more than 2,400 ISACA members from 126 countries.
AVG Technologies, a provider of internet and mobile security, today launched its “AVG Community Powered Threat Report -- Q1 2011,” providing insight and background on the trends and developments in the world of online threats.
Communication researchers at four major universities have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing expeditions than those who limit their online activity.
SafeNet’s trusted authentication solutions allow organizations to create and protect sensitive information in a secured environment, leveraging SafeNet’s programmable tokens and hardware security modules for comprehensive protection.
This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level.