It is generally accepted that increased password complexity results in better security. But researchers at Microsoft and the University of Ottawa have now published a paper (PDF) on the topic that concludes somewhat the opposite.
The official blog from Satisnet Ltd
Splunk Enterprise is a fully featured, powerful platform that collects and indexes any machine data from virtually any source in real time. Many customers download Splunk to solve a specific issue, but quickly find themselves using it to do much more than they originally intended.
The Zombie Zero malware has been used to target at least half a dozen large European and US Companies by simply scanning business critical data, financial records and other ERP information away.
IBM and Apple have announced an exclusive partnership that teams the market-leading strengths of each company to transform enterprise mobility through a new class of business apps which will bring IBM’s big data and analytics capabilities to Apple’s iOS devices.
Malcovery’s analysts have identified a new trojan based heavily on the GameOver Zeus binary, which has begun distribution as an attachment in spam email messages. Once opened, the malware attempts to contact certain websites in accordance with a domain generation algorithm, the goal of which is to make contact with a server that can in turn provide instructions to the malware.
Lost, stolen or damaged devices cause frustration and downtime as a result of data loss, but will also cost your company money. Identifying all the areas of impact that data loss has on your company can enables you to make the business case for a solution to address these issues.
Despite heavy investment by enterprises in intranets and SharePoint, in many organisations these services are not ready to support mobile users, forcing them to fall back on on email for file sharing and transfer.
AccelOps was included on the Gartner Magic Quadrant for Security Information and Event Management (SIEM) for the first time this year. The report noted how detection of threats and breaches in addition to compliance are important drivers for enterprises SIEM projects and purchases.
Further to the recent retirement of Windows XP, Sophos has issued a reminder that Oracle will not be issuing an update to Java on XP on the 15th July when it releases its regular update.
Mobile phones and tablets come with a collection of default apps, including email, web browser, calendar and maps. Many enterprises provide their employees with additional apps, such as VPN, security and bespoke apps for unique business functions. Most users will also install numerous additional apps of their own choice, and in some cases these can number more than 100.
Aerohive has announced that they have been positioned by Gartner, Inc. in the “Visionaries” quadrant of the 2014 Magic Quadrant for Wired and Wireless LAN Access Infrastructure. Vendors were evaluated based on their ability to execute and completeness of vision.
A seemingly innocent HTML experiment by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack. BBC News and CNN weren’t the only ones affected: nearly 1,000 Twitter accounts were hijacked.
Widespread adoption of cloud computing and the storage of data in a multitude of locations has created an increasing requirement for security and reliability. Enterprises must now widen their security strategy to include the monitoring and protection of cloud-based data.
Employees are increasingly reliant upon using their personal and company issued mobile devices to perform their jobs. Access to corporate data is required regardless of the time, place or device, and enterprises are having to implement solutions that securely protect corporate data without compromising productivity. Seamless backup and restore capabilities are now required across a multitude of different devices and operating systems.
Cloud computing and agile development are accelerating how quickly applications are deployed into the cloud. That means application teams are assuming more responsibility for how and where apps are deployed in the cloud.
There’s no shortage of Mobile Management Device (MDM) solutions to choose from, and Lumension has just entered the market with an MDM solution that is integrated into their already successful Lumension Endpoint Management and Security Suite (L.E.M.S.S.) platform.
A new report from SkyHigh Networks, the company that enables IT, Security and Compliance teams to discover, analyse and secure cloud services, has found that the use of cloud services within enterprises has grown by 33% since last quarter. However, only 7% of these services are considered “enterprise-ready.”