Hundreds of store managers exchange confidential information with the help of Intralinks VIA to keep competitive advantage Intralinks® Holdings, Inc. (NYSE:IL), announces a new customer win; one of the leading French retail groups with 800 brands under its name, Système U. Système U will use Intralinks VIA® to secure confidential data shared between store managers, helping the organisation to maintain competitive advantage against rival retail groups. The company reviewed a number of vendors, including its incumbent system, and decided that Intralinks VIA was the best solution to help ensure the security of its confidential information. Prior to the deployment of…
Author: ISBuzz Team
Security experts from Lieberman Software, STEALTHbits Technologies and Tripwire commenting on reports of a massive new iPhone user data breach. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erin, Director of IT Security and Risk Strategy at Tripwire : “Users may be acutely aware of the limitations that are imposed on the iPhone by Apple, but they might not think through the protections that the Apple eco-system puts in place to prevent this kind of attack. Jailbreaking your iPhone delivers increased flexibility, but it comes at a cost. The world outside of Apple’s universe isn’t always so safe. “There’s little doubt that this malware will pay dividends for whoever…
Organizations small and large are struggling with a fragmented approach to endpoint management. And if you haven’t found this struggle to echo familiarity, you may have bigger problems than I can address here. Rather than managing and reporting on all endpoints in a holistic way, today’s marketplaces are managing different endpoint classes (PCs, servers, mobile devices) and non-traditional endpoints (ATMs, kiosks, and POS systems), with a wide range of tools—and sometimes with completely different IT teams. On top of that, they may use a variety of tools for different environments (Windows, Mac, Linux, etc.), as well as for different lifecycle…
Industry leader introduces new solution to expand security visibility and improve proactive risk reduction Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, announced the debut of Tripwire® Asset Discovery Appliances, a high-performance, easy-to-deploy device and application discovery solution. Tripwire Asset Discovery Appliances are the only solution offering built-in integration with Tripwire® Enterprise, the industry’s leading security, compliance and configuration management solution, which is trusted by more than half of all Fortune 500 companies. Tripwire solutions protect many of the largest, most sensitive networks in the world, including nine of the top 10 utilities in the U.S.,…
Password-Based Authentication No Longer Capable of Meeting Modern Security Demands LaunchKey, the leading mobile authentication platform, today released findings from a recent survey which found that password-based authentication is no longer capable of meeting the demands of modern information security. According to survey data, an overwhelming 84% of respondents would support eliminating passwords all together. Additionally, more than three-fourths of those surveyed (76%) feel their data would be more secure with an alternative form of verification, with 59% preferring fingerprint scans over passwords. Nearly half of the survey respondents (46%) said they currently have more than 10 passwords to manage,…
Ian Hermon from Thales e-Security commented on the latest news about limit put on contactless card payments will rise from £20 to £30 from September. [su_note note_color=”#ffffcc” text_color=”#00000″]Ian Hermon from Thales e-Security : The rise in contactless spend limit will come as good news for consumers, extending the size of shopping basket for which they can enjoy the seamless ‘tap and go’ experience. Contactless security has been on the receiving end of some negative – and misleading – headlines of late. It’s important to note that the reported weakness is nothing to do with the card. The same information would…
One year on from the iCloud hack which caused global outrage. Despite the negative consequences of the breach, it acted as a wake-up call for businesses and consumers that cyber-security could no longer be ignored. Silvio Kutic, CEO at Infobip commented about how 12 months on it appears that the attack has had a positive effect on the cyber-security ecosystem. [su_note note_color=”#ffffcc” text_color=”#00000″]Silvio Kutic, CEO at Infobip : “When Apple hit the headlines 12 months ago after its iCloud service was breached and celebrities’ private images were plastered across the internet, many felt the hackers had won a major battle…
More than 350 billion data fingerprints are used to automatically detect breaches in minutes MapR Technologies, Inc., provider of the top-ranked distribution for Apache™ Hadoop®, today announced that Terbium Labs, a security software company that proactively searches for stolen data on the Dark Web using a patented, privacy-protected, data fingerprinting technique, is using the MapR Distribution as the big data platform for Matchlight, a first-of-its-kind data intelligence system. The data-centric solution closes the breach detection gap and minimises the damage, loss and risk caused by a data breach, which costs corporations and consumers billions of dollars annually. Terbium Labs developed…
88 per cent of organisations claim their Freedom of Information (FOI) responses are fully compliant with data protection laws, despite a rise in FOI-sparked data breaches Public sector organisations are struggling to balance demands for transparency with the need to protect data, according to a study[i] from Iron Mountain (NYSE: IRM). While an overwhelming 96 per cent of public sector bodies claim to be prepared for all FOI requests, and 88 per cent say their responses comply with data protection laws – a third (35 per cent) admit that skills gaps are putting this at risk. The Information Commissioner’s Office…
New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction HP Protect, the company’s annual enterprise security user conference, HP introduced new enterprise data security capabilities designed to support customers as they shift from traditional security methods to protecting interactions between users, applications and data. Delivered through the data-centric security offerings of HP Atalla and HP Security Voltage, these new capabilities address PCI compliance, data de-identification and collaboration security. Cyber criminals today are motivated to steal enterprise data, intellectual property and employee or customer information. According to a report from Intel…