ADS BY GOOGLE

Perpetual preparedness is tough to maintain. Vulnerability management tends to be an overwhelming task because of the growing number of devices and continual stream of warnings, alerts and notifications— whether it is security patches or zero day exploits, you name it. Mapping how thes...
In this series of blogs we will expose how fraudsters operate, we will run through several typical fraud scenarios, we will investigate where, how and why legacy detection solutions fall short, and what can be done to improve them. Banks and Insurance companies lose billions of dollar...
The adoption of cloud storage technology for a broad range of consumer and business applications is transforming the storage landscape by transitioning away from traditional disk arrays to object-based storage systems that have the scalability, availability, resiliency and accessibilit...
My name is Larry Warnock, and I'm the CEO of Gazzang, a data security software company based in Austin, Texas. Our headquarters are actually right across the street from the Capital Factory which you visited this past May. I recognize that the healthcare.gov launch hasn't exactly met ...
When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches. Of course I think of the cloud when discussing security. In the contemporary world...
Businesses of all sizes will have something within their premises which will have significant financial value. The typical office will have a number of computers, a server, numerous items of hardware such as mice and keyboards, a printer and plenty of office furniture. Protecting all t...
Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. ...
Imagine you work at a company preparing to issue its quarterly earnings report. The phone rings. It’s bad news. A coworker has discovered that a former employee has been logging into the company’s network for months. It’s unclear whether the former employee has used this illicit access...
Identity and access management solutions provide governance and visibility capabilities that enable organizations to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. Enterprise IAM deployments are generally eff...
HP's CISO Brett Wahlin explains the increasing threats facing enterprises across the world and how companies are evaluating, and must evaluate, their options for not only dealing with them, but predicting them and preventing them. Join HP’s Chief Information Security Officer (CISO) to...
SecurityStockWatch.com: Thank you for joining us today, Steve, please tell us about your background and your role at HP. Steve Lazerowich: With over 15+ years’ experience with security solutions, I joined HP Enterprise Services in 2010 as a Senior Solutions Designer, responsible for ...
Learn how static analysis helped a leader in the aerospace, space, ground transportation, security & defense markets reduce the rate of defective components by 30%. Thales Italia boasts a solid portfolio of products and technologies destined for both civil and military markets. They o...
The reemergence of the Dirt Jumper botnet in association with fraudulent wire transfer and ACH transactions continues to highlight one simple truth: cybercriminals are all about money, whether it is generated directly via fraud or via access to information. Dirt Jumper came into the ...
More than fines and reparations, intrusion Security significantly impacts customer retention. Damage done to brands because users don't trust doing business with that company is staggering. In terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a ...
Hackers and other attacks have become a major concern for businesses of all sizes. There are many reasons why your network could be taken out and rendered offline. Having your website down for even a few minutes can cause serious damage not only to your bottom line but also to your com...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
Want the secret to user provisioning/de-provisioning in an enterprise setting, The one word answer,…Integration.The question is why, how & with what? The need to credential authorized users to your network and other proprietary assets is clear. You only want those with the proper righ...
In the world of information security, small businesses and the security needs of small businesses are often overlooked, particularly in the realm of application security. When looking at the investment required to build a robust application security program, it really doesn’t make sens...
CSC Global Cybersecurity, in a strategic partnership with HP, is helping companies and governments better understand and adapt to the tough cybersecurity landscape. We’re going to learn from a panel how professional services provider CSC, in a strategic partnership with HP, is helpi...
Every day, employees make tradeoffs between productivity and security, which means routine security training is necessary for safeguarding company and customer data. Common sense alone is inadequate. For instance, do most of your employees think it’s okay to connect an encrypted USB st...
On a recent trip back to the United States from abroad, I stood in line with several others as we waited for Homeland Security officers to check our documents and credentials. You knew as you waited in that long line of other residents returning from their trips, that when the person a...
When we talk about online security there’s a school of thought that suggests you can either make it safe, or you can make it easy to use, but you can’t have both. As we see a sharp rise in online fraud and identity theft it seems that traditional passwords are neither. The 2012 Ident...
But what is malware and what makes it so particularly bad for your PC? Malware - short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. Below is a list of the top ten things you may not, but should, k...
From its origin in 1995, SSH, the secure shell data-in-transit protocol, has been used the world over as a method to transfer data between machines, as well as a tool to provide remote administrator access. Some variation of the protocol is packaged free in every version of Unix, Mac O...
What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys’ without blinking. But recent headline events – and a ‘biggie’ last year – have raised serious doubts about the ability of cryptographic keys to pr...
A mini Y2K event for applications stranded on those old, obsolete servers. The challenge is clear. EOL means no more patches and security vulnerabilities increase on a daily basis. For those wishing to keep their machines running, this is a situation that requires action.. There are t...
Every business wants to protect its confidential financial information. But for an organization like ours, financial information is our entire business. Over the course of a year, Broadridge handles millions of trades worth trillions of dollars, so it’s easy to see how security must be...
Despite the recent flood of high profile network breaches, hacking attempts are hardly new. In 1995, I was attending school in Helsinki when I discovered a password “sniffer” attack in our university network. In response, I wrote a program called the “secure shell” to safeguard informa...
It goes without saying that 'Big Data' is very much a hot topic right now. In fact, there doesn't seem to be a day when we're not being spoken to, about or on the subject, and when you consider the possibilities of what Big Data provides it's not hard to see why. It allows organizati...
2011 ended with the popularization of an idea: bringing VMs (virtual machines) onto the cloud. Recent years have seen great advancements in both cloud computing and virtualization. On the one hand there is the ability to pool various resources to provide Software as a Service, Infrastr...
A major telecommunications provider is tackling security, managing the details and the strategy simultaneously, and extending that value onto their many types of customers. We definitely are at the time and place where attacks against organizations have changed. It used to be that you...
Centrify, the ISV that makes its living leveraging Microsoft’s Active Directory, has got some new cloud-based widgetry that lets organizations centrally secure and control access to their Software-as-a-Service (SaaS) deployments. The adoption of SaaS apps combined with the Bring-Your...
Designing and implementing a hybrid encryption application is a big challenge but without a supporting infrastructure it’s almost impossible. There are open source libraries that allow you to encrypt a file but only provide the translation technique. After the information has been encr...
Lake Health's Information Security Officer has been expanding the breadth and depth of risk management there to a more holistic level -- far more than just a series of security products. Many people are practicing IT security and they're employing products and technologies. They're pu...
Wireshark doesn’t just work in real time. If you save a history of network activity in a pcap file using a tool such as tcpdump, you can filter the data with Wireshark to search for evidence. Intrusion detection tools that use the libpcap C/ C++ library [1] for network traffic capture...
Imagine it as if it’s actually happened – your network has crashed and all your organization’s critical applications and associated data have vanished. This worst-case scenario is one every business owner fears. Whether it’s due to a storm, a break-in or the crash of your hard drive, t...
Liberty Mutual Insurance is building security deeply into its overall business practices, not just viewing it as an IT add-on. This has led to higher enterprise resiliency and responsiveness to risk. We'll see how the requirements of compliance and regulatory governance are aligning w...
It’s that time of the year again. The flood of email alerts showcasing online holiday shopping deals fill the inbox at your office PC, laptops and wireless devices as merchants attempt to lure online shoppers to “click and save” while supplies last. In fact, reports show that this year...
Data centres are the lifeline of organizations and companies. This is because most backend operations like web hosting, data back up, data storage, email hosting and e-commerce activities are all carried out at the data centres. These data centres are also pivotal in ensuring websites ...
Using technology to break down corporate silos within IT is not a new concept, but seeing it in action is a testament to the power technology has to transform business. One area of IT that is currently undergoing such a transformation is network security operations. Over the past few y...


ADS BY GOOGLE