Cyber Security Institute

Sunday, October 31, 2004

Greatest security risk: Social engineering, says Gartner

The greatest security risk facing large companies and individual Internet users over the next 10 years will be the increasingly sophisticated use of social engineering to bypass IT security defences, according to analyst firm Gartner.

MORE... (0) Comments

Vendors promise solid tech support, but our test found long hold times and poor advice

What really sells security managers on one AV vendor over another?  As a follow-up to Information Security’s technical review of desktop AV products, Information Security investigated the state of the AV industry’s customer support, putting five vendors to the test: Computer Associates, McAfee, Symantec, Sophos and Trend Micro.

MORE... (0) Comments

Friday, October 29, 2004

Biometrics early adopters reveal secrets, challenges

In a conference room overlooking the site of the World Trade Center, early adopters of biometrics technology this week stressed the importance of determining someone’s true identity.

MORE... (0) Comments

Symantec - driving security deep into an enterprise

This week, Symantec has unveiled its new corporate positioning.  Long regarded as one of the leaders in the security technology space, the vendor has been building out its portfolio of offerings to drive security deep into organisations, whilst maintaining the high levels of computer systems availability that companies need to keep their businesses running efficiently.

MORE... (0) Comments

Companies under security pressure

Most large companies are struggling to protect themselves against security threats, a survey suggests.

MORE... (0) Comments

Thursday, October 28, 2004

Sourcefire touts ‘smart’ network defence

Sourcefire, the company founded by the creator of the open source Snort intrusion detection system, has added improved vulnerability detection technology to help customers bolster their security defences.

MORE... (0) Comments

Businesses lack spyware protection

While a majority of companies are increasingly concerned about the growth of spyware on their employees’ desktops, few are using anti-spyware technology, according to survey results released on Wednesday.

MORE... (0) Comments

Wednesday, October 27, 2004

Trends in Web Application Security

An increase in the usage of web applications is directly related to an increase in the number of security incidents for them.  This attention comes with the benefit of it being addressed as a higher priority now, but with the drawback of still being in an emerging area of technology.

MORE... (0) Comments

For some drivers, smart cars do connect

You can now can check your e-mail, view Web sites and even watch television from the comfort of the driver’s seat—that is, if you live in Europe or in Japan.

MORE... (0) Comments

A Snapshot of Security Project Plans, the Security Market and Vendor Mindshare

This article shows the current security trends in a series of charts

MORE... (0) Comments

Tuesday, October 26, 2004

Cisco upgrades IP telephony security

Cisco Systems says that it has improved security on its Internet Protocol telephony products.

MORE... (0) Comments

‘Secure cloud’ on the horizon for Microsoft

Microsoft plans to release in December new software designed to secure instant messaging and other communications within big companies.  LCS may be the first step toward enabling what analysts call a “secure cloud” for exchanging data between different systems to make presence work.

MORE... (0) Comments

Monday, October 25, 2004

New I.B.M. Report Will Warn of Computer Security Threats

IBM plans to begin releasing a monthly report of threats to computer networks in an effort to establish an indicator similar to the federal government’s Homeland Security Advisory System.

MORE... (0) Comments

Microsoft reworks antispam spec to silence critics

Microsoft reworks antispam spec to silence critics

MORE... (0) Comments

Mind those IMs—your cubicle’s walls have eyes

As more and more companies install monitoring software to track employee activities—threatening to turn cubicles into no-privacy zones—businesses that offer workplace surveillance tools are enjoying a boomlet.  Security cameras and phone monitoring have long given bosses a view into workers’ daily habits.

MORE... (0) Comments

Friday, October 22, 2004

Check Point Beefs Up Protections For Insider Attacks

Check Point Software Technologies this week plans to unveil an upgrade to its InterSpect internal security gateway.

MORE... (0) Comments

Thursday, October 21, 2004

Survey reveals a security disconnect

A recent security survey by Ernst & Young LLP found that there is both a lack of IT security priority in the executive suite and a lack of security awareness among users.

MORE... (0) Comments

Metrowerks drives Linux towards automotive industry

Metrowerks, a provider of products for embedded developers, introduced Automotive Grade Linux (AGL), which will allow automotive companies to create navigation, hands-free phone and infotainment systems based on a customised version of the open-source operating system.

MORE... (0) Comments

Cisco boost security line-up by acquisition

Cisco Systems is making an acquisition designed to reinforce its security lineup, the company said.  The networking giant announced it will pay $74m in cash for San Francisco start-up Perfigo, a developer of network access control products.

MORE... (0) Comments

Exe Vaccine neutralizes untrusted executables

Horizon DataSys announced on Wednesday the availability of Exe Vaccine, a filter that stops users from installing untrusted executables in real time.

MORE... (0) Comments

IBM jumps into Liberty Alliance

IBM has joined the Internet security consortium Liberty Alliance at the request of a customer, European mobile telecommunications provider Orange.

MORE... (0) Comments

IT chiefs use scare tactics to tighten security

Despite increasing awareness of IT security threats, many IT administrators are reduced to using scare tactics to get management support for tighter security procedures, research has revealed.

MORE... (0) Comments

Microsoft Blogger: Replace Windows Passwords With Passphrases

A Microsoft security manager is advocating the use of multi-word “passphrases” rather than passwords to secure Windows networks, arguing that passwords of less than 10 characters are inadequate against the latest hacking techniques.

MORE... (0) Comments

Epok Poses Alternative For Managing User Access

Given the difficulties associated with deploying and maintaining identity-management systems, it was only a matter of time before an alternate approach hit the market.

MORE... (0) Comments

Wednesday, October 20, 2004

Microsoft delivers SP1 for Windows server

Setting the stage for what it hopes will be a “breakout year” for its server operating systems, Microsoft has announced it will ship the first Release Candidate of its Service Pack 1 (SP1) for Windows Server 2003 by year’s end as well as a SDK for the High Performance Computing version of Windows Server in November.

MORE... (0) Comments

Ex-staff pose threat to data

One in five businesses run the risk of sensitive information falling into the hands of competitors by failing to remove access rights of former employees, research shows.  Some 23 per cent of companies are leaving corporate networks exposed to the threat of data theft and attacks by former staff by failing to revoke former staff IT access rights for weeks, months and in some cases years after the have left, according to research from Citrix.

MORE... (0) Comments

ATMs in peril from computer worms?

Some anti-virus firms are trying to carve out a new market for their technology by trying to persuade banks that Automatic Teller Machines (ATMs) running Windows need protecting from computer worms.

MORE... (0) Comments

Tuesday, October 19, 2004

New ways of measuring security

Information security managers at agencies and businesses have more options for protecting the organizations from cyberattacks and insider threats thanks to new wares from several security information management vendors.  Agency officials also can collect more comprehensive security data from a variety of sources as well as ensure that systems are compliant with various legislation and government regulations such as the Federal Information Security Management Act (FISMA).

MORE... (0) Comments

Traditional Anti-Virus Can’t Meet New Threats

The need to defend networked electronic gear like PDAs and smart phones will drive anti-virus defenses away from the signature-based techniques of today and toward next-generation behavioral-based tactics.

MORE... (0) Comments

Monday, October 18, 2004

Feds Eye Larger Security Role for Private Sector

As legislators and department of Homeland Security officials continue to debate whether to give the nation’s top cyber-security official more authority, the people involved in securing the country’s networks are working out a new arrangement that may portend an unprecedented level of cooperation between the DHS and the private sector.

MORE... (0) Comments