Cyber Security Institute

Friday, October 30, 2009

Thieves target BT cables as scrap value rises

Thieves in Sussex, England made off with more than half a mile of BT cabling in an overnight operation that cut off 800 homes and businesses.


Thursday, October 29, 2009

Study: Midsize Companies Cut Security Budgets As Cyber Threats Escalate

McAfee has released research finding from a global study that midsize organizations are cutting their security budgets at the same time that cyberthreats are escalating.


Thursday, October 22, 2009

User errors will lead to data leakage – worldwide survey on IT security

A worldwide survey of over 400 organisations with over 500 employees shows that, although organisations believe that they will suffer data leakage in some form at some stage, it will be accidental rather than malicious.  The survey which was commissioned by Dimension Data and carried out by research house IDC during 2009 focused on IT security and interviewed IT security decision makers and influencers in 18 countries in Western Europe, the Americas, the Middle East and Africa, and Asia and Pacific.  “The fact that 57% of the organisations that IDC polled are planning investment in data loss (or leakage) prevention (DLP) indicates broad acceptance of the need to complement the traditional network-centric security approach with data-centric security,” says Neil Campbell, Dimension Data’s global general manager security solutions.  “Organisations (45%) also believe that data leakage is more likely to occur through human error on the part of their own employees, rather than through intentional theft from outside (15%).


Feds’ Security Spending On a Roll: Over 8 Percent Growth Over Next Five Years

The U.S. federal government’s IT security spending will jump from $7.9 million to $11.7 billion in 2014 thanks to tightening federal security regulations, a 300 percent jump in attacks on feds’ networks and systems during the past five years, and the Obama administration’s emphasis on security, according to new data from research firm Input.


CIA Invests In Social Media Monitoring Technology

Businesses are increasingly looking to social media to monitor and manage their brands online. U.S. intelligence agencies now have similar capabilities as part of their technology portfolios.


Wednesday, October 21, 2009

Information Security Still a Priority In IT Budgets

A survey from PricewaterhouseCoopers shows that infosec budgets are seeing little in the way of cuts, and are even increasing in some cases.
Just because there’s a global economic crisis doesn’t mean the security teams at the world’s companies will be getting any kind of break in their work.


Tuesday, October 13, 2009

Transglobal Secure Collaboration Program Welcome CA, Inc.

The Transglobal Secure Collaboration Program (TSCP) announced that CA, Inc., the world’s leading independent IT management software company, is its newest member.
CA joins TSCP’s expanding lineup of organizations, governments and technology providers committed to driving common standards for secure collaboration across the global aerospace and defense (A&D) industry.


Friday, October 09, 2009

Six Steps Toward Better Database Security Compliance

In a sea of compliance initiatives, database security is often overlooked.  But experts say no matter what the regulations say, securing the database is a critical part of any compliance effort.  “What I’ve found in my experience is that the database is often the forgotten layer, even though it’s the layer where the crown jewels—the data—usually resides,” says Scott Laliberte, global leader of information security assessment services for Protiviti, which conducts third-party audit assessments for enterprises.  But improving the security of the database as part of a larger compliance initiative is doable, experts say.  The trick is to follow six steps toward database compliance.