Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: News

http://www.ebcvg.com/articles.php?id=909

Posted on September 27, 2005December 30, 2021 by admini

The report quite rightly concluded that it is not a lack of available technology that is responsible for those respondents not having a disaster recovery plan in place, but that in fact the IT industry hasn’t informed the market on the solutions available. The good news is that this lack of knowledge on the part of end-users presents a big opportunity to resellers to educate the luggards and reap the rewards.

With compliance and Sarbanes Oxley firmly lodged in the conciousness of IT Managers throughout the UK and Meta Group reporting that estimated demand for storage products has risen steadily during the past 12 to 18 months, the market is obviously growing.

There needs to be a simple solution offered by vendors to their channel partners that saves them money by minimising the time needed for configuration and pricing, while ensuring complete accuracy in their proposals for customers.

Two of the main reasons for companies deciding not to implement SANs were the cost of the hardware and the cost of implementation. The main reason, however, was the lack of a perceived business benefit for installing a SAN, an indication that despite the growth in demand for storage, the opportunity-cost is not being entirely explained, or entirely understood.

http://www.ebcvg.com/articles.php?id=909

Read more

Report: Security Slip-Ups Don’t Ding Stock Prices For Long

Posted on September 23, 2005December 30, 2021 by admini

To answer those questions, Belva charted stock prices before and after data losses at the likes of Polo Ralph Lauren, UPS, Choicepoint, Bank of America, and Citigroup; took into account other news during those time spans that likely affected the price; and also looked at the long range trends in each company’s stock.

“[Stock prices are] the only publicly visible measure of confidence in a corporate institution,” said Belva. Most security problems don’t effect the company’s stock price. Although prices may dip temporarily on bad news of a data breach, the price rebounds quickly. If Citigroup and UPS lost 3.9 million customer records every week and Bank of America’s employees were found to consistently sell customer information illegally, we would most likely change our minds about where we do business,” said Belva in his paper.

In the Citigroup/UPS incident, in which the latter lost a shipment of tapes containing nearly 4 million current and former accounts, Belva found that Citigroup’s stock price fell a puny .02 percent the day the financial firm put out a press release on the lost tapes, but that the stock actually rose 0.27 percent when the story made the media four days later.

UPS’ stock, meanwhile, climbed 0.22 percent the day after the story made the rounds.

Only when a data loss impacts the core business of a company — such as when Choicepoint admitted to selling data to fraudsters, or when third-party credit card processor CardSystems was hacked, resulting in the exposure of nearly 40 million cards — does the stock, and thus the company, take a hammering, Belva said. In Choicepoint’s case, its stock price fell 3.1 percent on the day the breach was reported, and then continued to fall.

“Based on the known cases, there is a good chance that the stock will decline in the short term and rebound soon after. In effect, it may be possible to make money off the publicly reported breach.

http://www.techweb.com/wire/security/171200329

Read more

Security Becomes Financial Watchword

Posted on September 19, 2005December 30, 2021 by admini

The data-security problem reached a new level in June when it was disclosed that a security breach at payment processor CardSystems Solutions Inc. had led to the exposure of 40 million card accounts.

Citigroup has said it would encrypt all tapes bound for transit, while Bank of America improved its tape-tracking procedures and launched a system intended to thwart phishing.

“A day doesn’t go by where information security isn’t front and center,” says Katherine Busser, CIO of the U.S. card division at Capital One Financial Corp.

Banks, insurance companies, and investment firms will spend $362 billion worldwide this year on IT, according to research firm TowerGroup. Other IT priorities in financial services are profitability management and improving revenue streams using technology, according to research firm Financial Insights.

http://www.informationweek.com/showArticle.jhtml;jsessionid=JXRN20RYC05RQQSNDBECKH0CJUMEKJVN?articleID=170703276

Read more

E-Mail Remains A Point Of Vulnerability

Posted on September 12, 2005December 30, 2021 by admini

Spam filtering is the major focus of any messaging security strategy.

While small companies on average spend 29.5 hours per week per 1,000 users to manage E-mail security, 9.1 hours per week per 1,000 users are spent combating unsolicited messages. Larger companies on average spend 15.2 hours per week per 1,000 users on messaging security, with 4.1 hours per week devoted to anti-spam management, according to Osterman Research. Yet, effective administration of messaging systems requires more than anti-spam management.

The research firm’s Messaging Security Market Trends 2005-2008 study finds that businesses face a myriad of messaging problems.
– Of the 115 companies surveyed, two-thirds struggle to provide adequate storage for E-messages.
– An equal number have inadequate E-mail archiving.
– Two in five say large E-mail attachments are taxing their messaging capability.
– Most alarming, nearly all surveyed companies have had their networks successfully penetrated by a virus, worm, or other form of malware through E-mail.
– Half the sites report employees sending or receiving inappropriate content electronically, while 40% have had staff view inappropriate content. E-mail bandwidth has been clogged at a third of sites because of employees oversubscribing to E-newsletters or mailing lists.
– Nearly half of all companies say employees have E-mailed or instant messaged confidential data, while nearly 20% have been infiltrated by a virus or related threat via IM.

Antivirus and anti-spam initiatives are the basis of any messaging security strategy. But content filtering for outbound E-mail and methods to monitor IM are lacking. Of the 115 companies Osterman Research surveyed, 43% don’t monitor the content of E-mails sent by employees, and three in five don’t monitor IM.

http://www.informationweek.com/showArticle.jhtml;jsessionid=KK01LHWEU4STQQSNDBCSKH0CJUMEKJVN?articleID=170702044

Read more

Does E-mail Retention Require Your Attention?

Posted on September 9, 2005December 30, 2021 by admini

Therefore, monitoring and storing this mountain of content can easily seem like an overwhelming project to begin and maintain for corporations and banks alike. While it is has long been accepted that an employee’s corporate e-mail account is not protected under personal property laws, I do not believe that employees ever thought that their everyday banter would ever be neatly filed pending the possibility of future reference. Sarbanes Oxley (SOX) regulations may cause security auditors and data management professionals to move even the ever popular one-line emails to the filing cabinet.

This is because although emails are informal in nature, electronic documents are as legally binding as hard copy communications. Already, the Securities and Exchange Commission (SEC) requires all private brokerage houses and banks to save hard copy, email, and instant messenger communications in regard to any stock trade or investment which occurred within the past 3 years. This SEC retention of records statute (section 17a-4) has been continuously adjusted, added too, and enforced since 1939. These regulations were originally established to help assure that brokers did not raise their commission rates or become involved in investment fraud.

This need was stemmed by notable court cases such as Morgan Stanley V. Ronald Perelman (Revlon), a case which has already pushed Morgan Stanley ahead of the curve in saving all of their communications, and cost them somewhere in the ballpark of 1.45 billion dollars. Morgan Stanley is now leading the way in these practices in hope of avoiding further litigation and fines for not having proper email retention policies in place. Many entities are looking for the most cost effective services possible when beginning this process and this search has pointed towards hierarchical storage management services.

http://bankinfosecurity.com/node/2570

Read more

VOIP Pushes the Security Market

Posted on September 7, 2005December 30, 2021 by admini

“Traditional firewall technologies can complicate several aspects of VoIP, most notably dynamic port trafficking and Network Address Translation (NAT) transversal,” says Victoria Fodale, In-Stat analyst.

“Security product vendors are adding functions that address voice applications in their products, but, as history has shown, security typically lags behind advances in technology.”

http://www.ebcvg.com/articles.php?id=876

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • …
  • 147
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme