Last week, I attended keynotes and sessions at the RSA conference hosted at the Moscone Center in San Francisco, taking notes as furiously as possible and sprinting back and forth between rooms – leaving little energy and time left to live-blog coherently after. As a result, I’ll be blogging about some of the more interesting talks this week as a retrospective. True, many of the keynotes are available as videos online, but here’s my summary and top takeaways from some of the speeches from the Microsoft and Intel leaders: Enhancing Cloud Trust Scott Charney, Corporate VP of Microsoft’s Trustworthy Computing,…
Author: Information Security Buzz Editorial Staff
The proliferation of Bring Your Own Device (BYOD) within the modern business environment was as much a matter of timing as anything else. The growth in employee owned devices dovetailed with the global financial crisis. Businesses looking to reduce their overall capex costs therefore encouraged the trend as the cost of purchase, replacement and general day-to-day management of hardware became the responsibility of the owner. Coupled with this, BYOD actually brought untold benefits to organisations. Not least of which by allowing workers to access systems from outside of the physical parameters of the office led to a general trend for…
Centrify Privilege Service Addresses Today’s Hybrid IT Environments of On-Premises and Cloud-based Systems as the Most Comprehensive Privileged Identity Solution on the Market Centrify Corporation, the leader in unified identity management across cloud, mobile and data center, announced the launch of Centrify Privilege Service (CPS), the industry’s first cloud-based identity management solution that addresses today’s growing gap in security, visibility and control over privileged accounts. Centrify executives are currently conducting briefings on CPS at RSA, taking place now at San Francisco’s Moscone Center, in booth 415. Essentially “the keys to the kingdom,” privileged accounts provide elevated access to an organization’s…
Recently, Obama issued an executive order that places economic sanctions on individuals or group cyber attackers that aim to threaten US national security or economic activity. The order comes on the heels of a momentous year for malicious cyber crime—A report by PricewaterhouseCoopers found that the number of detected cyber attacks skyrocketed in 2014—up 48% from 2013. The average annualized cost of cyber crime came to $12.7 million for US private companies in 2014, according to a Ponemon study. In addition to the order, the President has also proposed US legislation to Congress that would increase protection for consumers online.…
Márton Illé, security evangelist for BalaBit IT Security, reviewed the new 2015 Verizon Data Breach Investigations Report and made the following observations. Márton Illé, security evangelist, BalaBit IT Security: The annual Verizon Data Breach Investigations Report is out and it is worth giving it a go to learn from the lessons of our unlucky fellows in 2014. In many aspects 2014 was a year just like the previous one, though there are some interesting changes and also some trends from the past years that did not change at all. When we talk about IT security usually people consider it a technology question…
CIO’s today are faced with a dilemma. On one hand more and more data is moving to the cloud. Increasing numbers of corporate users are demanding better ways to access, store, manage and share their data with others across multiple devices. But on the other hand, public cloud services like Dropbox that make this possible can have major drawbacks for IT teams in terms of privacy, security and control. IT leaders need to find an answer before a rising tide of ‘Shadow IT’ drowns UK firms into security risk, compliance trouble and spiraling costs. Storage is booming It might be…
European organisations have an average of 511 cloud apps; an average which rises to 730 at a global level Compromised credentials continue to haunt cloud app usage: 13.6 percent of enterprise users have had their log-in details compromised 70 percent of uploads to cloud apps by people with compromised accounts are to apps rated “poor” in terms of enterprise-readiness Netskope, the leader in safe cloud enablement, today released the April 2015 Netskope Cloud Report™ which revealed that cloud app usage continues to grow across enterprise organisations with 15.1 percent of European organisations now using over 1,000 cloud apps. At a…
Tech Data to Offer the NCP Secure Entry VPN Clients to its SMB Market Segment MOUNTAIN VIEW, Calif. (April 15, 2015) —NCP engineering, security technology market leader, and Tech Data, one of the world’s largest wholesale distributors of technology products, today announced an agreement that brings remote access VPN solutions to thousands of resellers.
The Roer Group is now accepting students for its Security Culture Summer Camp 2015!
The Trojan Dyre (also known as Dyreza) has been around for quite awhile now, terrorizing the banking industry, stealing passwords and enabling malicious hackers to make off with money stolen directly from individual accounts.