Niara Integrates Big Data Analytics and Forensics to Discover, Investigate and Respond to Sophisticated, Hidden Threats Within an Organization Cyber security startup Niara emerged from stealth today to unveil its Security Intelligence solution, the first of its kind to combine advanced security analytics and forensics to help security teams quickly surface sophisticated cyber threats within their organization. Built on a big data architecture, the Niara Security Intelligence solution analyzes security data from disparate sources to ensure that security teams can quickly identify and respond to sophisticated, multistage attacks that regularly thwart existing monitoring and response solutions. Enterprises increase spend on cyber security tools each…
Author: ISBuzz Team
Designed Exclusively For Apple Devices, Family Protector Empowers Parents to Take Back Control of Online Activities for Children of All Age Intego, the leading provider of security solutions for the Mac, today introduced Family Protector, a new parental control product designed exclusively for Apple iPhone, iPad, and iPod Touch devices. Family Protector was created to help busy parents set appropriate limits on device and app usage, prevent accidental app and in-app purchases, monitor Web activities, and easily control access to content based on the age of their children. “As every parent can attest, technology is both a blessing and a…
Intralinks on the state of corporate information security The risk to corporate data has never been so great. Businesses are fending off an ever-growing range of security threats, from state-sponsored espionage and targeted attacks to new zero-day vulnerabilities, while also being forced to address their employees’ sharing habits. Nevertheless, businesses must be able to communicate freely and effectively with both internal and external parties. Yet, this vital communication does increase the risk of sensitive corporate information falling into the wrong hands if not handled in a sufficiently secure manner. The risk of breaches, interception or accidental leaks means that free…
Following the news the identity theft is on the rise in Britain, please find below comment from Richard Parris, CEO of cybersecurity company Intercede. “The sharp rise in identity theft in the UK over the last year is a direct result of the widespread lax security procedures seen as consumers and companies alike persevere with outdated username and password-based authentication. This already porous level of security is then made even less effective by the continued use of basic password combinations, which are then used for multiple logins. “In Intercede’s study The Rise of the Identity Centric Economy, these poor habits…
Comments from Secure Channels and Proficio on IRS Hack Richard Blech, CEO and Co-Founder of Secure Channels: “The IRS notes this issue does not involve its main computer system that handles tax filing submission; that system remains secure,” I would not consider this to be an accomplishment considering what was stolen was 100,000+ taxpayers’ SSN’s and personal sensitive data – a virtual treasure trove to steal identities. To get this sensitive data from the “Get Transcript,” the hackers tried over 200,000 times. So apparently the IRS is lacking security alert systems for being breached, proper authentication using biometric-multi-factors and deep…
First Phase of Partnership Offers Broad Set of Security Solutions to Help Customers Address Changing Threat Landscape Akamai Technologies, Inc. (NASDAQ: AKAM), the global leader in content delivery network (CDN) services, and industry-leading managed security services firm Trustwave, today announced a new strategic alliance designed to help businesses more effectively fight a wide range of malicious online activities through vulnerability assessment, denial of service prevention and incident response. Through this partnership, Akamai and Trustwave plan to make available to their respective customers select technology solutions and security services from each company’s portfolio. The strategic relationship is intended to allow both…
Latest enhancement to the CipherCloud platform enables compliance of cloud services with EU data residency requirements Today, CipherCloud, the leader in cloud visibility and data protection, announces Next Generation Tokenization as a complement to the company’s suite of cloud data protection technologies. Tokenization protects sensitive data by replacing clear text data with a random “token” that bears no mathematical relationship to the original data. Regarded as one of the strongest forms of data protection, enterprises worldwide use tokenization in critical security environments and for data residency purposes. The offering, an integral part of the CipherCloud platform, combines strong data protection with natural…
Following our previous blog post “How long does website penetration testing take” we received a lot of questions from our customers and partners about the recommended frequency of penetration testing for their web applications. In this blog post we will answer that question. First of all, we would like to highlight that penetration testing is not the only thing that you need to perform in order to keep your website secure. A penetration test is not designed to protect you from all possible risks that your website faces, so you should always combine it with daily vulnerability and malware scanning, data…
Rui Melo Biscaia to lead “From Fences to Bodyguards” Discussion on June 2 Watchful Software, a leading provider of data-centric information security solutions, today announced that Director of Product Marketing, Rui Melo Biscaia will discuss the advantages of data-centric security at Infosecurity Europe, to be held June 2-4 at the Olympia in London. Biscaia’s discussion, “From Fences to Bodyguards- How data-centric security works,” will take place at the Security Innovation Showcase on June 2 at 4.30 pm. He will examine the changing information protection environment and all that encompasses including BYOD devices, cloud environments, and increased regulatory oversight. The session will…
FireEye researchers have identified a new malware threat targeting POS terminals. The malware arrives in an email inbox with what looks like a resume attached but it actually scans the system, looking for customer data. Comment from Ken Simpson, CEO at MailChannels : “We received a sample of this malware to one of our company’s email aliases – the resume attachment – and had a chance to review how it works. What makes this phishing attack particularly concerning is the skill with which the attackers have engineered their malware to infiltrate a very particular Windows-based point of sale system. POS attacks have been going…