Recent Articles
-
Proactive Threat Management Identified as Top Need: Report
Narus, a provider of dynamic network traffic intelligence and analytics for protecting governments, service providers and enterprises against cyber-threats and the risks of doing business in cyberspace, unveiled research from a Narus-sponsored study by the Ponemon Institute that pinpoints where cyber-warriors should concentrate their security efforts. Mobile security threats and nation-sponsored cyber-attacks ranked high among…
-
Data Security Measures Increase in Importance: Report
IT and data security specialist Becrypt commissioned research into attitudes and trends within the public sector, conducted using qualitative interview techniques with a range of public sector organizations shows that data security is now far higher on the agenda than in either of Becrypt’s previous two surveys. The survey also confirms that mobile working has…
-
Data Breaches Increase, but Data Loss Drops
Data loss through cyber-attacks decreased markedly in 2010, but the total number of breaches was higher than ever, according to Verizon’s “2011 Data Breach Investigations Report.” The number of compromised records involved in data breaches investigated by Verizon and the U.S. Secret Service dropped from 144 million in 2009 to only 4 million in 2010,…
-
McAfee Enhances Network Security Platform
Security specialist McAfee announced enhancements to its Network Security Platform, including enhanced botnet control through reputation intelligence, virtual network inspection and a traffic analysis port for network monitoring, forensics and other advanced analysis engines. In addition, real-time, reputation-based intelligence through McAfee Global Threat Intelligence provides Network Security Platform users with additional context for enforcing network…
-
HP Fortify Offers App Dev Security Threat Analysis Tool
Hewlett-Packard expanded its security solutions with a new real-time analysis tool based on the company’s Fortify acquisition. The new HP Fortify Real-Time Hybrid Analysis allows organizations to discover the root cause of software vulnerabilities by observing attacks in real time, HP said April 12. With real-time analysis, organizations can proactively reduce business risk and minimize…
-
SafeNet Tries to Lure Away RSA SecureID Customers
SafeNet has unveiled migration bundles to provide organizations with a full-fledged authentication platform as an alternative to what they currently have deployed. SafeNet’s trusted authentication system is flexible enough to support enterprises regardless of whether they want to deploy hardware or software tokens, smart cards or even mobile devices, the company said April 13. SafeNet…