March 5, 2014

By Fahmida Y. Rashid

Verizon Communications Enterprise Solutions last week launched a new Verizon Cyber Intelligence Center (VCIC) to offer organizations advanced incident response and detection capabilities.

March 1, 2014

By Linda Musthaler 

Two months since the news of the massive Target breach broke, reports are starting to reveal bits and pieces of how the perpetrators were able to get a foothold inside Target’s point of sale system to steal tens of millions of customer account records. In time, there will be a complete forensic analysis of the breach, with lessons for every IT security professional to take back to their own workplaces.

February 20, 2014

By Richard Stiennon

Cylance is a new vendor in the end point protection space. They caught my attention with a completely new way to discover malware on Windows devices. In addition to launching their CylancePROTECT product this week they just announced a $20 million funding round from BlackstoneKhosla VenturesFairhaven Capital and private investors.

February 19, 2014

By Gail Bronson

Vormetric has announced a new application encryption tool kit, which equips corporate IT departments with the ability to create and integrate encryption in their own applications. The new solution, called Vormetric Application Encryption, extends Vormetric’s data security platform with tools to encrypt data at rest within the enterprise and web applications, as well as cloud and big data environments.

February 3, 2014

By Linda Musthaler

The healthcare market has been generating much attention lately.  Everyone from individuals to corporate executives is focused on the changes and provisions as they relate to health insurance.

January 30, 2014

By Gail Bronson

Guest Contributor

These days every company conducting business on the Internet must be vigilant to stave off the endless onslaught of viruses and other malware.  Attackers who use software programs to make unauthorized intrusions are eager to steal website content and gain access to the content and databases behind each website. Then these thieves use the stolen data for their own purposes or sell it for a lofty price.

January 14, 2014

By Richard Stiennon

Most organizations are familiar with Mark Monitor, A Thomson Reuters  service that continuously scans the Internet for abuses of brands and intellectual property. If a counterfeit website or even a domain is registered Mark Monitor will alert their client’s legal team. Now there is a similar service for your personal brand.

November 22, 2013

By Linda Musthaler

What is the top threat to web applications today? According to the Open Web Application Security Project (OWASP), it’s SQL injection. The problem is so pervasive that it has topped the OWASP Top 10 list of software security issues for several years in a row, and for good reason. Hundreds of millions of database records have been stolen using SQL injection techniques.

November 6, 2013

By Linda Musthaler

One day last summer I was in a bank branch, standing in line waiting to conduct my business. Bored, I studied my surroundings and took note of a security camera directed toward the teller station ahead of me. No doubt it was capturing video of each person that approached the teller window and especially of the teller herself who was dispensing cash as customers made withdrawals.

October 22, 2013

By Linda Musthaler

The top IT security threats of 2013 have one underlying root cause: employees using their own technologies and solutions with weak or even non-existent security controls to accomplish their work objectives.

The use of these types of what are generally cloud applications – from storage and file transfer to collaboration and productivity – can put a company at risk for data loss, privacy issues, and non-compliance with regulations and governance controls. However, that doesn’t mean there isn’t value in using these applications. Workers are going to use whatever tools help them do their jobs—whether the tools are endorsed by the IT department or not. This is often referred to as Shadow IT.

The startup company Skyhigh Networks aims to solve the dilemma of cloud services that have insufficient security controls. 

Page 4 of 4 : First   1 2 3 4 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter