How businesses can defend their network from APTs that exploit DNS No company was too big, and no sector of industry went untouched by the effects of malware and APT breaches in 2014. And with high profile breaches grabbing headlines, including those at JP Morgan and Community Health, few could have missed their significant consequences over the past year. APTs (advanced persistent threats) stealthily spread, mutate and conceal themselves within an organisation’s IT infrastructure. Created with the aim of carrying out long term attacks, APTs represent a significant threat to both the privacy and security of corporate data. Despite a…
Author: ISBuzz Team
Frustrated password users driven to crying, screaming, banging their head on the desk and swearing A third (33 per cent) of us admit to suffering from ‘password rage’ with many of us driven to crying, screaming and swearing. This is according to a snapshot poll taken by Centrify, a leader in unifying identity management, at Infosec Europe 2015 in London this week attended by IT security professionals. The findings reveal that users are becoming increasingly frustrated with trying to remember different passwords to access online accounts, with a quarter (25 per cent) saying they forget their password at least once a day –…
Only Security Product that Knows Where Apps are Weak and Deploys Adaptive Defenses Instantly Contrast Security today announced Contrast Enterprise, the first application security product to integrate defenses across development and operations, unifying vulnerability assessment, security visibility and attack protection throughout the application lifecycle. Now organizations can quickly assess and secure the enormous number of new, legacy and continuously changing applications that remain defenseless due to slow, inaccurate and complex first-generation application security solutions. According to the Verizon 2015 Data Breach Investigations Report, the number one cause of data breaches throughout the last eight years has been vulnerable applications. Yet, 90…
You may have heard the news that Google has announced a new payments system at I/O, Android Pay. Android Pay will work exactly like Google Wallet, where you simply tap your smartphone to any NFC terminal in order to pay your bill. Below is a comment from Cindy Provin, VP Global Strategy at Thales e-Security who says that if this new payments systems is to make an impact, securing data needs to be a number one priority. “This announcement of Android Pay by Google highlights the intensifying competition for mobile payments. The company has reinvented its mobile payments solutions and…
Two of the industry’s top cybersecurity experts commented on the recent hack of the IRS online Get Transcript service to access tax information from 100,000 taxpayers. The agency admits more than 200,000 attempts were made from questionable email domains, with more than 100,000 of those attempts successfully clearing authentication. Igor Baikalov, Chief Scientist, Securonix: “According to the IRS statement, attackers had enough information to successfully pass identity verification for over 100,000 taxpayers. I don’t know how the IRS can be so sure that this data was obtained from ‘a non-IRS source,’ since it seems to be exactly the kind of information the…
New Lieberman Software survey reveals that today’s complicated IT security solutions are not being properly deployed and, for most organizations, compliance trumps security Companies are putting their customers’ data at risk because IT teams do not have the expertise or time to deploy today’s complicated IT security products, a new survey from Lieberman Software Corporation revealed. The survey, which was carried out at RSA Conference 2015 and measured the attitudes of nearly 170 IT security professionals, revealed 69 percent of respondents do not feel they are using their IT security products to their full potential. As a result, a staggering…
The Queens Speech announced new monitoring powers “to tackle terrorism”. This bill entitled the “Investigatory Powers Bill” has its roots in the “Communication Data Bill” (nicknamed “the Snooper’s Charter”) which the government intended to introduce in the 2012-13 Parliamentary session. The Snooper’s Charter was eventually dropped due to opposition from the Liberal Democrats. The details of the new bill are not fully known as yet but it is believed that it will give the police and security forces even greater powers than those set out in the 2012 draft. What will almost certainly appear in the new bill is the…
News Highlights: HID Global’s FARGO® HDP5000 and DTC4500 printers make it possible for ISIC France to efficiently print and manage secure student ID cards for the French grandes écoles universities. ISIC France is looking to further collaborate with HID Global to implement a mobile ID access solution. HID Global’s secure card issuance solutions deliver an improved and faster user experience especially for high volume student ID card requirements. HID Global®, a worldwide leader in secure identity solutions, today announced that International Student Identity Card (ISIC) France, a leading student ID organization, has selected the company’s FARGO® HDP5000 and DTC4500 card printers/encoders as well as its AsureID®…
Comments from Vasco and Tripwire on IRS News that Hackers Grabbed Tax Info from 100,000 John Gunn, VP, VASCO Data Security (www.vasco.com): “This attack has remarkable similarities to the Apple hack of last summer where there were a large number of successful compromises of an unsound security infrastructure that resulted in breach-like consequences. This highlights the change that has occurred in the market for stolen data. Social Security Numbers are becoming the primary high-value target of hackers because they are worth ten times as much as credit cards and they are protected by a fraction of the security of banking assets.…
Centrify Identity Service, Built on Microsoft Azure, Extends Office 365 Success with New Capabilities and National System Integrator Partners including Perficient Centrify Corporation, the leader in unifying identity management across cloud, mobile and data center, today announced significant feature enhancements in secure user provisioning, license management, single sign on (SSO) and mobile device management for Office 365 (O365). Centrify Identity Service (CIS) for O365 runs on the Microsoft Azure cloud platform and is the industry’s most comprehensive solution for Active Directory-based SSO, user provisioning and mobility management. CIS is also Microsoft-certified as a “Works with Office 365” identity partner solution.…