Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: September 2008

CIS looks to community for security metrics

Posted on September 10, 2008December 30, 2021 by admini

To measure a company’s ability to deal with security incidents, the group suggested that companies measure the mean time between security incidents and the mean time to recover from security incidents.

As an indicator of a company’s network security readiness, companies should measure the fraction of systems configured to approved standards, the fraction of systems patched as per corporate policy, and the fraction of systems with antivirus software, CIS stated.

Finally, companies should review their software applications for potential security issues by measuring the fraction of business applications that have had a risk assessment, the fraction with a penetration or vulnerability assessment and the fraction of application code that had a threat-model analysis or security code review prior to deployment.

http://www.securityfocus.com/brief/814?ref=rss

Read more

A [Phone] Alarming Development at Tech Conference

Posted on September 10, 2008December 30, 2021 by admini

If the software detects that your phone’s SIM card has been altered, it will notify your reporting contact phone, sending them a log of calls and messaging activity made on the phone.

By sending a “Hang” command to your stolen phone, a loud alarm goes off repeatedly. The only way to make it stop — short of smashing the phone — is to remove the battery.

But that is only short-term relief, as Jain happily explained, since the alarm will resume blaring the moment the battery is replaced. “We’ll have support for Blackberry and Windows Mobile devices in the next four to six weeks,” Jain later told InternetNews.com.

Jain said the company is negotiating with carriers and other potential partners and expects to have information on rates and availability in the U.S. shortly.

According to Maverick’s Web site, another feature of the software, called “Spy Call”, will let the owner call the stolen device from the reporting phone.

http://www.internetnews.com/mobility/article.php/3770266/An+Alarming+Development+at+Tech+Conference.htm

Read more

IT security devours 10% of operating budgets

Posted on September 6, 2008December 30, 2021 by admini

Those are impressive numbers in this economy, analyst Khalid Kark said in a keynote during Forrester’s Security Forum in Boston.

An organisation-wide focus on security also brings higher expectations, and sometimes conflicting expectations from the various departments in a business. Security has been the top priority for CIOs in Forrester surveys for four straight years, and 30% of security decision-makers surveyed report having a “dotted-line relationship” with the board or CEO.

Kark attributes this change in attitude partly to data breaches and resulting media coverage and lawsuits that focus public scrutiny on information security.

http://www.computerworlduk.com/management/security/data-control/news/index.cfm?newsid=10842

Read more

Gartner Spells Out Changing Tech Scenarios

Posted on September 5, 2008December 30, 2021 by admini

It’s the startups that are bringing out new, innovative products, and will likely be acquired, he said.

In the next four years, Gartner sees continued consolidation of vendors, consolidation of servers through virtualization, a move toward green IT, an expansion of cloud computing and “hardware as a service” — i.e. hardware rental. Green IT won’t be just confined to the U.S., it will be a global effort. Gartner estimates two percent of worldwide carbon emissions are attributable to IT. “IT vendors are seen as part of the problem, so it will be necessary to get your house in order,” said Cox. Even though it is viewed as an emerging market with a much smaller IT infrastructure than the U.S., China is already concerned with power consumption and the government is coming up with guidelines on for businesses on power consumption policies.

Gartner Research Director George Shiffler then spoke of hardware spending as it relates to the economy. He ate some crow and admitted Gartner’s earlier predictions of a downturn in sales due to economic conditions didn’t manifest.

Citing research from the financial analysis firm Global Insight, Shiffler said there could be a notable drop in spending in the U.S. and Europe, which would result in slowdowns in sales in the second half of this yearand the first half of next year. However, it’s a slowdown, not a plunge like after the dot com bubble popped. The server market has to deal with a number of changes all at once: the economy, the decline of RISC and ascension of x86, the game changers that are virtualization and cloud computing, and the drop in average selling prices (ASPs).

Gartner believes cloud computing could be a disruptive force in the market, particularly for server vendors, and that server vendors will need to target a range of external and Web datacenter providers as customers try to avoid making commitments and go to pay as you go cloud services.

On the desktop side of things, Principal Research Analyst Mikako Kitagawa said that soon, China will surpass the U.S. as the single largest PC market. The reason for that is the U.S. is a “highly saturated” market, where people own two and three and four PCs, and much of the business is in upgrades and replacements. China is still growing as a market and has not reached saturation. HP and Dell combined hold about 55 percent of the total market, with Apple coming in third with around 10 percent of the market, and the best annual growth rate of 37.9 percent quarter-over-quarter.

Gartner is predicting mini-notebooks, also sometimes called netbooks, will ramp up significantly, led by ASUSTeK, with its popular Eee-PC. Mini-notebooks will be a consumer phenomenon, with 89.1 percent of sales in 2Q08 going to consumers. ASUS had 50 percent of the market in that quarter, but that might get spread around a little with the entry of more players, including Dell. Worldwide, Gartner expects mini-notebooks to hit more than 50 million units by 2012 under the best case scenario and around 25 million units under a most likely scenario.

http://www.internetnews.com/hardware/article.php/3769666

Read more

Survey: VARs Concerned About Cybersecurity, Health Care

Posted on September 5, 2008December 30, 2021 by admini

Shoer called health-care costs one of the largest issues facing the U.S. Rising health-care costs have become a worker-recruiting issue, added Shiv Kumar, executive vice president at ZSL, a VAR in Edison, New Jersey. Considering our business size, we can’t attract or retain good workforce without offering a good benefits package which could be offered easily by large organizations because of their size,” he said.

In focus groups in late 2007 and early this year, health-care costs came up several times as a top concerns of VAR members of CompTIA, said Michael Wendy, a CompTIA spokesman.

While Shoer and Kumar focused on health-care costs as their top policy concern, they both acknowledged that cybersecurity is a major concern as well. It can be difficult to talk some customers into buying more cybersecurity products or services, they said. “We finally had the client sign off on a document that acknowledged our disapproval of this practice and basically absolved us of any responsibility for any problems resulting from this partner’s unwillingness to conform to the firm’s password policy,” he said.

For most small businesses, cybersecurity comes down to a convenience issue, Shoer added.

IT workers need training in technologies such as Web 2.0, unified communication and virtualization, Kumar said.

http://www.pcworld.com/article/150658/.html?tk=rss_news

Read more

Zombie network explosion

Posted on September 2, 2008December 30, 2021 by admini

Shadowserver figures suggest the number of command and control servers has actually decreased over the last month, following a spike in activity back in July.

Not much by way of email malware activity has been monitored, so if the latter explanation is true, then drive-by download attacks are playing a bigger role in spreading botnet client infestation.

http://www.theregister.co.uk/2008/09/02/zombie_surge/

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme