The growth and increasing availability of colocation facilities is seeing an organisational shift when it comes to IT spend and investment, moving from a capital expenditure (Capex) model, to one focused on operational expenditure (Opex), according to Greg McCulloch, the CEO of Aegis Data. McCulloch, who is speaking as part of a panel debate at IPEXPO Europe, discussing the future of colocation, suggests we are in the midst of a significant move away from traditional IT infrastructure management. This is being driven by the rise in cloud providers seeking stable best-of-breed colocation providers to partner with, combined also with organisations, from SMEs…
Author: ISBuzz Team
Cybersecurity experts from Tripwire, Securonix and Lieberman Software are starting to react to news of a China-US cybersecurity agreement coming this week out of Washington. [su_note note_color=”#ffffcc” text_color=”#00000″]Stewart Draper, Director of Insider Threat for Securonix : “China has always denied involvement in data theft by its government, or encouraging Chinese companies from espionage practices, so I don’t think we will see a major difference here. I think we could see positive impacts in a reduction of APT’s that are easily identified as Chinese groups. I doubt that Chinese companies interested in intellectual property would necessarily follow the governments lead. I think this…
First reported to Microsoft in Feb 2015 by MWR Labs, a ‘use-after-free’ vulnerability (now identified as CVE-2015-1642) was discovered that affected Microsoft Office’s suite of desktop applications – including World, Powerpoint, Excel, and Outlook. To exploit a ‘use after free’ (UAF) vulnerability – a type of memory corruption flaw, an attacker needs to be able to manipulate the allocation/free of memory to execute arbitrary code. The issue is that this is not too difficult as previous flaws have proved – CVE-2012-4969, CVE-2012-4792, CVE-2015-0311 and CVE-2015-5119, are all examples of such UAF vulnerabilities in Internet Explorer and Adobe Flash found to…
Security Experts from Tripwire, Securonix and Voltage commented on the latest scottrade data breach. [su_note note_color=”#ffffcc” text_color=”#00000″]Mark Bower, Global Director Product Management, HP Data Security: “It’s almost mind-boggling that yet another major data breach has been revealed in less than a week. In this case, while the passwords may remain safe, one has to ask if the customers’ personal data was protected in the same manner? With the available technologies today to protect sensitive data very easily and quickly, it’s a simple matter to cover all sensitive data bases to protect consumer trust and satisfaction. It’s important that businesses follow best…
Experian, a vendor which processes T-Mobile’s credit applications, has been breached, putting 15 million T-Mobile customers at risk. Innocent users have had personal information such as their name, address, and date of birth exposed to the criminals. In addition, encrypted fields in the hacked databases including “social security number and ID number (such as driver’s license or passport number)” may be at risk. Security experts from Vasco, Tripwire, ESET, Intercede, Cyrptzone and Former FBI Special Agent, Nuix and Lieberman have the following comments. [su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Senior Security Analyst at Tripwire : “Wireless carriers have long been a hot target for hackers…
Lieberman Software Survey Reveals Many Organizations Fail to Take Proactive Approach to Cyber Defense A new survey from Lieberman Software Corporation revealed that 92 percent of IT security professionals believe that cyber security drills are a good way to prepare for cyber attacks. However, 63 percent of those surveyed admitted that their organizations never run such drills, or only do so annually. The study was carried out at Black Hat Conference 2015, and looked at the attitudes of nearly 150 IT security professionals. It also revealed that only 11 percent of organizations carry out cyber security drills quarterly, while 26…
The publicity surrounding such high profile retail hacks is bound to cause nervousness and anxiety among customers engaging with retailers online, making them more cautious about entrusting their personal and financial details to company web sites. The fact is, however, that it’s not just online sites that are vulnerable to hacking. Traditional retailers need to protect their systems and to appreciate the risk to their reputation if orders are lost or transactions fail. Following these four top tips can help online retailers to be prepared. The phenomenal growth in online retail has reached the point where it has become an integral…
Range Rover and BMW theft rates soar in London A security expert claimed that the recent rise in thefts of keyless vehicles was down to a ‘failure of security innovation’ by the automobile industry over the last 25 years. Dr Akhtar Khalil, founder of auto-security firm My Smart Remote, believes that billions of pounds could be saved in annual insurance payouts. A spate of thefts from wealthy districts across London this year has highlighted how outdated technology across the industry has affected even owners of high-end vehicles, with recent CCTV footage showing an £80,000 ($123,000) BMW being stolen in just…
Male Millennials are at most risk and therefore a good target for CSP web security service. Allot Communications Ltd. (NASDAQ, TASE: ALLT), a leading global provider of intelligent broadband solutions that empower communication service providers to optimize and monetize their networks, enterprises to enhance productivity and consumers to improve their digital lifestyle, announced the release of Allot MobileTrends Report H2/2015, 5+1 CSP Touch Triggers for Monetizing Customer Engagement. The report shows how the daily online behavior of each mobile customer can be used by CSPs to discover smarter ways to profile their customers and to propose targeted offers. Based on…
Findings Also Reveal Disconnect Between Consumer Concerns and Behaviors and General Lack of Personal Data Security Awareness in Mobile, PC, and Console Games PlayFab, the industry’s most complete backend service to build, launch and grow live games, today announced findings from its recent survey on cybersecurity concerns and awareness among gamers. The findings, which include responses from 500 participants that play video games more than four hours per week, revealed that 83 percent of respondents believe game developers should be responsible for securing players’ personal data, however fewer than 40 percent said they feel confident in current safeguards. Further, while…