• Study finds nearly 90 percent of businesses victim of cyber attacks

    A recent survey of information technology (IT) security professionals reveals that cyberattacks are on the rise and businesses have had difficulty defending their networks; 84 percent admitted to having been the victim of a cyber attack; these attacks have been costly causing a majority of companies an estimated $500,000 or more in lost revenues, cash outlays, business disruptions, and other expenses

  • Imation acquires MXI Security

    The cost of data breaches continues to rise annually, with the average organizational cost of a breach reaching $7.2 million in 2010; by 2014, the market for secure data solutions — protecting against data loss, theft, or breach — specifically designed to address secure portable storage, digital identity, and secure portable computing is expected to reach more than $4.5 billion; Imation, a major player in the field of secure data, further strengthens its offerings by acquiring the assets of MXI Security; the move is a continuation of Imation’s strategy of investing in key technology platforms to meet customers’ needs

  • Government launches cybersecurity plan

    Last week the Obama administration unveiled its plan to secure federal computer networks, critical industries, and consumers from cyberattacks; under the proposed plan, DHS will lead government efforts to secure networks with “primary responsibility within the executive branch for information security” ; DHS would also be empowered to set policies and activities for government systems; the plan would require critical infrastructure operators like electric companies and large financial firms to present cybersecurity plans to DHS for approval; DHS auditors would review the plans with the operators, discuss any shortcomings and “take other action as may be determined appropriate”

  • IT organization surveys potential insider-threats

    Employees are being overloaded with passwords; 10 percent of IT professionals are still able to access accounts from a prior job; 52 percent of employees admit that they have shared their work log-ins and passwords with other co-workers, and vice versa

  • NEC releases software that configures access policy automatically

    NEC Corporation announced the development of technology that collectively distributes and configures access policy to a variety of computing resources in a cloud computing environment; the newly-developed technology helps to reduce operation costs and to improve security

  • Google Apps more secure with two-step verification

    More and more companies are migrating their e-mail and other cloud services over to Google Apps — but the doubts about whether making such a transition would put company security at risk linger; now the company is doing something about it: Google announced early Monday the availability of two-step verification, a more secure way for Google Apps users to sign into their accounts

  • MI5: Cyber espionage on the rise, but can be easily beaten

    MI5 says the Internet has made the threat of espionage by foreign countries higher than ever before, but insisted it is “relatively straightforward” to block attempts to steal data; MI5 has previously written to the bosses of big British companies to warn them of the threat online, particularly from hackers with links to the Chinese intelligence services

  • Vulnerable IT infrastructure means loss of revenue

    Europeans businesses are losing approximately 17 billion Euros a year in revenue owing to IT disruptions; on average, European businesses suffer IT failures lasting an average of fourteen hours per company a year, amounting to nearly one million hours of down-time costs

  • The most pressing cybersecurity issue

    According to Red Hat’s Gunnar Hellekson the most pressing cybersecurity issue is “the threat that comes from our reactions to real and perceived threats…I see this growing ‘Fortress America’ movement around computer security and the security of the software-supply chain”

  • HP to buy security software company ArcSight for $1.5 billion

    Hewlett-Packard agreed to buy security software company ArcSight for $1.5 billion; ArcSight’s software helps companies protect their digital assets from cyber attacks and fraud, and aids in regulatory compliance. While many analysts said HP overpaid, they also said the deal fits with its broader enterprise strategy. Some, though, questioned the company’s financial discipline; the deal is the latest in a rash of consolidation in the security technology sector; last month, Intel Corp agreed to buy McAfee for $7.7 billion, and in May, Symantec Corp bought Verisign Inc.’s payment authentication unit for about $1.3 billion

  • Cloud computing addressing security issues

    With cloud improvements such as Google’s “sharding” — the dividing of an individual file among hundreds of systems to prevent someone from gaining a useful amount of information out of individual documents — being implemented and followed closely by competing providers, security and accessibility will become cloud facets continually improved upon

  • U.S. nuclear power plants bolster defenses against cyberattacks

    The threat to digital systems at the U.S. nuclear power plants is considerable — especially for new nuclear power facilities that would be built in the United States and throughout the world, as control rooms would employ digital systems to operate the plants; these state-of-the-art instruments and systems make them targets for hackers

  • Commerce Department seeks comments on cybersecurity and its impact on innovation

    The U.S. Commerce Department seeks comments from all stakeholders, including the commercial, academic and civil society sectors, on measures to improve cyber security while sustaining innovation; the department says that the Internet has become vitally important to U.S. innovation, prosperity, education, civic activity, and cultural life as well as aspects of America’s national security, and that a top priority of the department is to ensure that the Internet remains an open and trusted infrastructure, both for commercial entities and individuals

  • As demand for cybersecurity professionals grows, shortages are felt

    Federal agencies, contractors, and tech companies compete with each other for cyber security work force; measuring the size of the cyber security sector is difficult, but surveys show demand for technical expertise is skyrocketing; the number of jobs posted on ClearanceJobs.com by companies and recruiters looking for professionals with active federal security clearances has jumped 11 percent to 6,100 openings this year from fewer than 5,500 in the same time period last year; Maryland wants to become U.S. cybersecurity capital

  • Hacker built, and demonstrated, a $1,500 cell-phone tapping device

    Security researcher demonstrated a device, which he built for just $1,500, which can intercept some kinds of cell phone calls and record everything that is said; the attack illustrates weaknesses in GSM, one of the world’s most widely used cellular communications technologies