Theft of confidential information is a risk to the business and IT plays a large role in protecting the data. Not all data is electronic though. Files that identify customers and employees, Social Security numbers, credit card information and other account data are just some of the forms of sensitive data a company must protect. Failing to protect confidential information can lead to identify … [Read more...]
Cisco Expands Security Services Into the Cloud
Cisco today announced new additions to its portfolio that bolster the network security infrastructure and the delivery of cloud security services, thereby enabling businesses to collaborate with greater confidence even as their workforce and partners become increasingly mobile and interactive. Today's announcement, being made at the RSA Conference in San Francisco, comes at a time when … [Read more...]
RSA President Urges “Inventive Collaboration” to Combat Cyber-Threat and Reap Rewards of New Technologies
During the opening keynote at RSA Conference Art Coviello, President of RSA, The Security Division of EMC cautioned that the global cyber-threat continues to escalate and online fraudsters are more organized, collaborative and effective than ever. He addressed major forces such as the economy and emerging technologies that are driving the information security industry to evolve and adapt – and … [Read more...]
VASCO Data Security Offers Authentication Services Based on INDENTIKEY
VASCO Data Security Inc. a leading software security company specializing in authentication products, and the IT service provider datec24 Services are partnering to offer subscription-based DIGIPASS authentication to datec24 customers. Under the terms of the agreement datec24 will host VASCO’s IDENTIKEY® server. The IDENTIKEY server will be used to offer on-demand authentication to a number of … [Read more...]
HP Offers Free Web Security Tool to Help Businesses Guard Against Malicious Hackers
HP today announced HP SWFScan, a free tool to help Flash developers protect their websites against unintended application security vulnerabilities and reduce the risk of hackers accessing sensitive data. As companies modernize their applications to give users a better experience online, they are moving to Web 2.0 technologies, including the Adobe Flash Platform. With Adobe Flash Player … [Read more...]
Lack of End User Training is a Large and Growing Threat to IT Security
While information security remains a top priority for eight in ten IT professionals surveyed, many companies seem to be underestimating one of the most significant IT security threats - end user error. According to CompTIA's 7th Annual Trends in Information Security survey, human error is the primary cause of the most severe security breaches, yet significantly fewer organizations (45%) provided … [Read more...]
The Top 20 Most Critical Controls for Cyber Security
A consortium of federal agencies and private organizations have released Version 1.0 of the Consensus Audit Guidelines (CAG) that define the most critical security controls to protect federal and contractor information and information systems. For each of the 20 controls, the experts identified specific (actual) attacks that the control stops or mitigates, illuminated best practices in … [Read more...]
IT PCG Research Reveals Significant Savings Potential for Information Security and Audit
The IT Policy Compliance Group (IT PCG), of which ISACA is a sponsor, today announced the availability of its latest benchmark research report titled, “Managing Spend on Information Security and Audit to Improve Results.” Based on research conducted with more than 2,600 firms, the study reveals that 68 percent of firms are under-spending on information security relative to the financial risks … [Read more...]