Corporate Partners

Data Protection — News

4 keys for IP protection

Do you think data breaches are up or down in 2011 compared to 2007 or 2008? The official answer may surprise you. According to DatalossDB and the 2011 Data Breach Investigations Report [<a href="">PDF link</a>] by Verizon, the number of records compromised per year has been decreasing since its 2008 peak. But these reports are missing something very important. It all comes down to what is reported. Last year I met with more than 450 CIOs and CSOs, and almost all of them said that incidents are way up. New breaches are constantly making headlines, so why is there a discrepancy between our perception and what these reports are finding?

Jason Clark | 07 Feb | Read more

How to protect online transactions

The trusty telephone is emerging as one of the key elements in new multifactor authentication schemes designed to protect online banking and other web-based financial transactions from rapidly evolving <a href="">security</a> threats.

Julie Sartain | 07 Feb | Read more

Apple FileVault 2 encryption cracked by forensic software

The encryption keys for <a href="">Apple's FileVault 2</a> full-disk encryption used with OS X Lion can be recovered "in minutes" from memory, password-cracking outfit Passware has announced.

John E Dunn | 03 Feb | Read more

SaaS, APTs and asymmetric risk take spotlight at Security Threats 2012

I had the opportunity to speak at a new security conference last week, Security Threats 2012. I presented on the topic of balancing business benefits with risks in the cloud (more on that later), but the event touched on a wide range of pertinent IT topics, provoking stimulating discussions of some of the most pressing challenges business leaders are facing.

Bernard Golden | 03 Feb | Read more

Security culture begins at the top

What’s the most important factor of a successful security program? Technology such as endpoint protection? Making sure your change management processes and system development life cycle includes consideration of security risks? Strong policies? Not quite.

Wayne Chung | 02 Feb | Read more

Symantec recants Android malware claims

Symantec has backtracked from assertions last week that 13 Android apps distributed by Google's Android Market were malicious, and now says that the code in question comes from an aggressive ad network that provides revenue to the smartphone programs.

Gregg Keizer | 02 Feb | Read more

End-to-End Encryption: The PCI Security Holy Grail

With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor <a href="">US District Court ruling</a> on fifth amendment password protection rights, it is time you actually encrypt your data properly.

Ben Rothke and David Mundhenk | 02 Feb | Read more

What Is Deep Packet Inspection?

It's easy to turn a deaf ear to the controversy surrounding recent copyright protection bills like the <a href="">Stop Online Piracy Act</a> (SOPA) or the <a href="">PROTECT IP Act</a>, which threatened to curtail free speech on the Internet by allowing the U.S. Department of Justice to blacklist and block access to websites suspected of copyright infringement. Most of us don't visit websites suspected of illegally distributing copyrighted material, so blocking us from accessing them seems harmless. But should your <a href="">ISP</a> ever be legally obligated to prevent you from accessing restricted websites, it will have to find a way to monitor your online activity, and that could cause your privacy to be compromised if your ISP employs deep packet inspection tools to keep tabs on you.

Alex Wawro | 02 Feb | Read more

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place