For Second Consecutive Year, Imperva is the Only Company Positioned in the Leader’s Quadrant Imperva Inc. (NYSE: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today announced its sole leadership position in Gartner Inc.’s Magic Quadrant for Web Application Firewalls (WAF). This is the second consecutive year that Imperva has been named as the only leader in this space. “Being recognized as the only leader is a huge accomplishment,” said Anthony Bettencourt, CEO of Imperva. “Customers using Imperva SecureSphere and Imperva Incapsula know they are getting the best solution to directly protect their apps, and the…
Author: ISBuzz Team
It was announced that pharmacy chain CVS has taken down its online photo center CVSphoto.com, replacing it with a message warning that customer credit card data may have been compromised. The incident comes just days after Walmart Canada said it was investigating a potential breach of customer card data at its online photo processing store. The same processor serves Costco and other major retailers so the breach has potentially huge impact. Cybersecurity experts from Lastline, Lieberman Software, Proficio, Securonix Tripwire had the following reactions: Brian Laing, VP, Lastline (www.lastline.com): “Companies themselves are often great targets for attack. However attackers can…
Here to comment on the news that the hacking of AshleyMadison.com has exposed the personal data of 37 million users, many will be wondering why the information of those customers who had paid for a “full delete” was still recoverable from the company’s servers are security experts from Blancco Technology Group, Tripwire and Veracode. Pat Clawson, CEO of the Blancco Technology Group : “I think the biggest concern here has more to do with people believing they had paid for their sensitive information to be fully wiped, when that simply wasn’t the case. Sure, users’ data may have been ‘deleted’ but was it…
Bryan Lillie, head of Cyber Security at QinetiQ commented on the sports hacking. Bryan Lillie, Head of Cyber Security at QinetiQ : “Anyone can be hacked, it’s not just banks and governments and we all need to treat security seriously. IoT, which includes including many devices which monitor and collect personal information, creates huge amounts of valuable data which represents a new target for hackers, blackmailers, competitors and critics. The more that data become critical to your operation, the more seriously you need to take it. Sports team may not seem like the traditional target of hackers, but if you…
As the Tour de France fever ratchets up around the world, it’s clear to me that businesses can draw several parallels with professional cycling and their disaster recovery (DR) strategy. If businesses and cyclists plan ahead, it’s possible for both to have a real-time support crew on hand the moment something goes wrong. And, just seconds after it goes wrong, the support crew solves the problem and the cyclist, or business, gets back to what it does best. Imagine you’re midway through the Tour de France, your leading the peloton and then your brakes overheat and your tire bursts. Up…
In response to the news that Apple Pay has launched in the UK, Below comments from Mark James, security expert at ESET, which discuss the security implications of the new functionality. Mark James, Security Expert at ESET : What are the security measures and failsafe’s in place? Apple has taken the security of Apple Pay very seriously, they have implemented additional security measures with the banks involved to help protect sensitive data. User’s credit card numbers are not stored on your device, instead their details are tagged to a unique device account number that is stored in the “Secure Element”,…
Latest version of EventTracker offers advanced solution for Threatscape 2015 and beyond EventTracker, a leading provider of comprehensive SIEM solutions today announced the general availability of the newest version of its flagship security and compliance offering, EventTracker 8. Today’s data security landscape is more insecure than ever before. Despite the deployment of an array of security solutions, cyber-attacks too often remain undetected for months, creating massive financial, operational and reputational impact for the breached organizations. Detection systems produce excessive alerts forcing security analysts to spend hours on manual validation to eliminate false positives. Persistent threats require an equally persistent response. EventTracker 8,…
Ludlow, Shropshire. UK, Idappcom the specialist vendor of network security testing tools and security rules has announced the latest release of Traffic IQ Professional (TIQ), its advanced security assessment and network penetration testing tool. TIQ is used by many of the sector leading security vendors in their pre-production validation processes as well by in-house IT staff and 3rd party security consultants to regularly audit and assess network security defences against the latest exploit traffic, in a live network environment. Traffic files can be selected and replayed from an extensive library of over 9,600 threats and exploits to test the effectiveness…
Barclays has to pay £250 in compensation to 2,000 customers after their personal data was found on a USB stick at a flat in England.Mark James, Security Specialist at IT Security Firm ESET discusses the issue and whether the compensation that Barclays is offering is enough. Mark James, Security Specialist at IT Security Firm ESET : Is it appropriate for Barclays to store such data on USB sticks? “If data needs to be moved from one location to another or backed up for transit from one system to another then you are limited to the actual means to do so.…
Patient Symptoms You can’t open a newspaper or visit any type of IT website lately without reading of another data breach at either a healthcare provider or health insurer. According to a recent Ponemon Institute study, a staggering 91% of healthcare organizations had at least one data breach over the past two years, whilst 39% had two to five data breaches, and 40% had more than five data breaches over the same period. Not surprisingly, after all the press they have generated over the past twelve months, the Ponemon study found that healthcare organizations accounted for 45% of major data…