CEOs, business leaders and Board of Directors drive six in ten (61%) cloud migrations More than a third (37%) of cloud migrations aimed to accelerate innovation Nearly nine in ten (88%) respondents said their organisation’s business goals were met to some extent by their migration to the cloud Rackspace® (NYSE: RAX), the #1 managed cloud company, announced the results of a Vanson Bourne study* into the true underlying nature, rationale and drivers behind a cloud migration. The study, which polled 500 UK IT and business decision-makers who have either been through or are currently planning a cloud migration project, found…
Author: ISBuzz Team
I spoke with a couple of companies recently and discussed their Software Development Life Cycle (SDLC) processes. I was alarmed that they completely missed one of the fundamental aspects of the SDLC process, a reoccurring theme from a conference the week prior. A large majority of companies overlook a critical aspect in a good SDLC process: An effective SDLC process should use the results from vulnerability assessments and penetration tests to review what part of their SDLC should or could have stopped that issue from being a vulnerability and ensuring that specific area is addressed. Too many people treat discovering…
New Version Released as One Million User Milestone Approaches SMS PASSCODE has announced that version 8.0 of the company’s platform for multi-factor authentication has been released. For business leaders, who are becoming increasingly aware of the rising threat from hacking and tasked with minimizing risk for their organizations, the fact that more than 75% of all network breaches involve weak or stolen passwords is alarming. This highlights the importance of validating the identity of those accessing business networks and systems and user authentication is the tool to help them do this. IT and security managers around the globe are quickly…
Around half have access to company IP or other information they deem above their pay grade Research reveals value of company information is poorly understood across the board Only 39% of UK employees recognise that intellectual property (IP) could damage their company if leaked, according to new research from data loss prevention company Clearswift. This laissez faire attitude is particularly worrying, given many employees have both access and a relatively high propensity to lose or give away data. 44% of respondents say they have access to such sensitive IP, with 35% also saying they have access to organisation’ information that…
An enormous cache of phone records obtained by The Intercept reveals a major breach of security at Securus Technologies, a leading provider of phone services inside the nation’s prisons and jails. The materials — leaked via SecureDrop by an anonymous hacker who believes that Securus is violating the constitutional rights of inmates — comprise over 70 million records of phone calls, placed by prisoners to at least 37 states, in addition to links to downloadable recordings of the calls. The calls span a nearly two-and-a-half year period, beginning in December 2011 and ending in the spring of 2014. Particularly notable within the vast trove of…
A new report by Avast details how it hacked into a Vizio smart TV and gained access into a home network. For most consumers who use Vizio Smart TV at home daily, the idea that it could be targeted by hackers never crossed their mind. Craig Young, security researcher at Tripwire explains how serious this actually is and what companies and businesses can do to protect themselves. [su_note note_color=”#ffffcc” text_color=”#00000″]Craig Young, Security Researcher at Tripwire : “The risk of smart TVs cannot be understated. These are devices with access to the network and often times contain a variety of out of date…
It’s Halloween, and once again, zombies, Dracula, Michael Myers, the Woman in Black, and other denizens of the Dark Side are out to get us. But even as we suffer the terrors of the night, we know that other threats too lie outside our corporate walls, waiting to attack our innocent, unprotected Wi-Fi networks. However, take heart: Just as a simple wooden stake can destroy a terrifying vampire, a little knowledge may save even the most misguided horror movie character. With the right information and good IT tools (and a sharp axe from the woodshed), you too can stand against…
F-Secure poised to seize control of the consumer security market after announcing a next generation security product designed to protect smart homes. F-Secure announced its latest security solution today during a keynote address at the Slush startup conference in Helsinki. The new product, called F-Secure SENSE, combines unique hardware and software to provide people with a single source of protection for all of the devices in their homes – including PCs, tablets and smartphones, as well as newer Internet of Things (IoT) products. “People are starting to buy all kinds of new smart devices to use in their homes and…
Organizations can fall into two categories: Those who have been successfully phished, and those that will be successfully phished. Some experts may be bold to say there is nothing more certain in life than death, taxes, and phishing. Wisegate, a peer-driven IT research company, recently held a roundtable discussion on the topic of phishing. An internal poll showed 100 percent of the participants had been previously phished, 80 percent successfully. The question, “Can increased user awareness and/or improved technology successfully detect and prevent phishing?” has since been asked in reports, surveys, and one-on-one interviews with CISOs. Unfortunately, the answers and…
Capabilities answer demand of customers who deploy hardware security modules across multiple locations Thales, leader in critical information systems and cybersecurity, security modules (HSMs) across all locations. Thales HSMs can now be monitored and remotely managed in a similar way to general IT equipment in data centers, keeping operations staff fully informed while helping them pro-actively respond to potential security or performance issues using complementary Thales HSM management tools. The result is a dramatic reduction in operating costs to monitor HSMs providing users with an effective tool in helping to maintain the security and operational efficiency of their complete HSM…