Cyber Security Institute

Thursday, June 30, 2005

Senate Ponders Toughest Data Protection Bill Yet

Two senior U.S. Senators introduced a wide-ranging data protection bill Wednesday that would send officials from companies who do not disclose security breaches to jail for up to five years, and bring the RICO Act to bear on identity theft gangs.


Phishing Up By 226 Percent

Phishing is up dramatically over the last two months according to data released Thursday by computer maker IBM and message filtering firm Postini.


Australian banks warn of new scam

Two large Australian banks are warning customers about a new email scam that may be targeting their accounts.


Wednesday, June 29, 2005

India To Tighten Data-Secrecy Laws

India will tighten laws to prevent cyber crimes and ensure data secrecy after a call center employee allegedly sold personal data on 1,000 British customers, an official said


Tuesday, June 28, 2005

Security Execs: Under Pressure and Under Prepared

A new survey of corporate security executives shows that their jobs are more difficult to handle than just a year ago, and they’re not prepared to handle some significant security issues.


Monday, June 27, 2005

Gartner: Relax about overhyped security threats

Don’t believe the hype about some of the computer security threats emphasized in industry and the media, two Gartner Research analysts said today.


Feds Face Deadlines on Smart ID Cards

Time is running out for federal agencies to comply with a 2004 presidential directive calling for governmentwide adoption of smart cards to authenticate employees for access to buildings and IT systems.


CA buys firewall developer Tiny Software

Computer Associates (Profile, Products, Articles) International (CA) announced its acquisition of Tiny Software, a Santa Clara, California, developer whose firewall software will be added to CA’s eTrust security portfolio.


Cisco Buys Security Vendor NetSift For $30 Million

Snapping up another small security vendor, Cisco Systems said it plans to acquire NetSift for $30 million in cash and options.


Wednesday, June 22, 2005

SMBs Urged to Take Security Steps

A group of security experts offered their thoughts on what SMBs need to focus on when coming up with a coherent IT security plan.


Mass TCP Port Attack Could Be Imminent, Analyst Warns

An ominous increase in sniffing activity on TCP Port 445 could signal an impending mass malicious code attack targeting a recently patched Microsoft vulnerability, according to a warning from security researchers.


Tuesday, June 21, 2005

Targeted Trojan-horse attacks hitting U.S., worldwide

Cyberattacks aiming to steal proprietary information have targeted companies and government agencies across the globe, including the U.S., security experts said.  On June 16, the United Kingdom’s incident response team, the National Infrastructure Security Co-ordination Centre, warned that stealthy Trojan-horse attacks were targeting specific U.K. companies and government agencies.


IT Security? The Key for Employee Productivity

A recently published research reveals the repercussions of computer viruses and other security problems and their correlation to downtime on the job in small and medium businesses.  The research, conducted by Maritz among IT managers, reveals that nearly all (90 percent) reported that computer performance levels were affected by up to 50 percent due to security issues.


Seagate preps hard-disk encryption technology

Next year Seagate will start shipping a security technology for some of its hard-disk drives that will make life more difficult for notebook PC thieves to read stolen data.


Microsoft: No New Sybari Sales for Unix, Linux

Microsoft’s enterprise anti-virus plans do not extend to customers on Unix and Linux platforms.


Secure Your Shredding

For years, companies have been routinely shredding physical documents to ensure that confidential and sensitive information doesn’t fall into the hands of competitors.  New technologies are making it increasingly easy to reconstruct virtually any document, and if you are worried about the security of sensitive material, you should know a little bit about document shredding and document reconstruction.


Sunday, June 19, 2005

Sun To Ship Identity Management Federation Services

The availability of more advanced and secure identity management platforms and technology for connecting companies is making B2B more palatable to the corporate masses.  To that end, Sun Microsystems and Microsoft are extending their identity management platforms with federation capabilities to enable cross-company pollination.  Sun unveiled the Sun Java System Federation Manager and Sun Java System Identity Manager Service Provider Edition.


CA Integrates Backup And Security For Small Companies

Computer Associates has debuted a line of “protection suites” with security, storage, and desktop-migration tools targeting small and midsize businesses.  CA says the five suites, which combine multiple CA products, are easy to deploy and require little integration work.


Friday, June 17, 2005

Symantec to unveil security intelligence tools

Symantec plans to announce two new appliances: Security Information Manager 9500 and 9550.  Due out in September, the appliances are aimed at helping users analyze data from firewalls, antivirus software and other security products.


Bosses on the prowl for risque pics

Ninety percent of the largest U.S. companies have procedures in place in case inappropriate or illicit images are discovered in the work place, and 50 percent have had to use these procedures for incidents in the past year, according to a study released Friday.


Wednesday, June 15, 2005

Trend Micro Dips Into Spam

Anti-virus specialist Trend Micro is branching out into the anti-spam market with the purchase of Kelkea for an undisclosed price.


Windows 2000 Still Running On Half Of Corporate PCs

Mainstream support for the now-aging operating system ends on June 30th, but many firms aren’t ready to move to XP.


Tuesday, June 14, 2005

Browser-based attacks increase as viruses dip

As the threat to IT operations by viruses and worms dips, browser-based attacks are increasing, according to a technology trade organization.


Identity Auditing is the Key to Maintaining SOX Compliance

The Sarbanes-Oxley Act (SOX) has profoundly affected IT governance and operations, especially Section 404: Management Assessment of Internal Controls.  Organizations of all sizes are struggling to put the processes and infrastructure in place to address SOX compliance needs.


Monday, June 13, 2005

Symantec unwraps intrusion detection

Symantec plans to take the wraps off a new intrusion detection product, while rival McAfee is set to announce a Linux update to its Entercept software.


Authentication remains a Problem for Web Services Security according to a recent Survery

Developers working on authentication methods for Web services are more likely to reply on their own custom-developed methods, rather than industry-standard methods like SSL or SOAP, survey reveals.


Friday, June 10, 2005

Juniper Brings Best Of IPsec, SSL To VPN Lineup

Juniper Networks has added flexibility to its security lineup with an upgrade to its VPN family that combines the benefits of IPsec and SSL technology.


Security guidelines for U.S. agencies due in July

The National Institute of Standards and Technology (NIST) will soon begin releasing formal guidelines federal agencies can use to assess their compliance with a set of mandatory information security rules due to take effect early next year.


Keeping Voice Safe in the New Converged

Converged voice and data systems are now a reality.  They are bringing a myriad of benefits to customers - ranging from efficient use of bandwidth to enhanced scalability, cost reductions and improved productivity.  One of the most significant is the way in which the threat to systems security and in particular to the integrity of voice communications has changed.


Security Tops List of Financial Executives Concerns

For the first time, information security topped this year’s list of concerns related to technology among financial executives, replacing prioritizing technology investments, according to a newly published research.