Category Archives: Mobile Security

National Cybersecurity Career Fair in June Will Connect Employers to Entry Level Cybersecurity Workers

Do you know anyone who is an aspiring cyber security professional? Here is some important information to pass along to help them get their career started. This is also big news if your organization is looking to recruit entry-level people for IT security positions. Coming up this June 18 and 19, 2014, Cyber Aces is presenting the first National Cybersecurity … Read more

Posted in Application Security, Cloud Security, Data Protection, Governance, Risk and Compliance, Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , | Leave a comment

Six Ways that Most Companies Shortchange Their Enterprise Security

I recently had a conversation with Michael Sutton, vice president of security research for Zscaler and head of Zscaler ThreatLabZ. We talked about where many organizations are falling short today in defending against current threats and especially the more dangerous advanced persistent threats. I’ve singled out six common shortcomings that Sutton sees among most companies today.

Posted in Governance, Risk and Compliance, Mobile Security, Network Security, Security Management, Security Threats | Tagged , , , | Leave a comment

Store Systems Security: Preparing for the Retail System and Security Paradigm Shift

I was in an Office Depot the other day. There was one person in line at the checkout counter and another customer approaching the line. Then a sales clerk intercepted the person heading toward the line and said, “I can help you right here, sir.” The clerk had a mobile device in her hands. She swiped the customer’s credit card, … Read more

Posted in Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Sophisticated Attackers Combine E-mails With Phone Calls

Security vendor Symantec has given fresh details of a series of sophisticated cyber attacks targeting mainly French companies in which the criminals combine e-mail with voice calls to steal money. “These tactics, using an email followed up by a phone call using perfect French, are highly unusual and are a sign of aggressive social engineering,” the company said in a blog … Read more

Posted in Data Protection, Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , | Leave a comment

Here we go again. Another stolen laptop puts patient information at risk

It happened again—another doctor’s office, another stolen laptop laden with patient records. The Houston Chronicle is reporting that a laptop computer containing unencrypted information pertaining to nearly 600 patients has been stolen from the University of Texas Health Science Center at Houston. Sigh. When will they ever learn?

Posted in Data Protection, Mobile Security, Uncategorized | Tagged , , , , , | Leave a comment

A new generation of IT security solutions for an evolving threat landscape

I recently had a chat with Manish Gupta, senior vice president of products at security vendor FireEye. Gupta described how the IT threat landscape has changed dramatically over the last three or four years, and how this has rendered legacy security solutions rather weak. This means that a new generation of IT security solutions has to be developed to counter … Read more

Posted in Application Security, Cloud Security, Mobile Security, Network Security, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Gartner Sees Security Opportunity in Expanding Mobile Market

The proliferation of mobile devices is opening new opportunities for security vendors, but innovative approaches to the market are needed, Gartner Inc says in a new report. Ruggero Contu, research director at Gartner, says one of the challenges facing vendors is that consumer adoption and willingness to pay for antivirus software on mobile devices is low.

Posted in Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Thinking About How to Secure the Internet of Things (IoT)

Michael Cooney of Network World published a semi-silly article about malware affecting smart toilets that run the Android operating system. (See Just when you thought it was safe to go to the bathroom – toilet malware strikes.) The article reports that TrustWave SpiderLads issued a security bulletin to warn users of the software-controlled toilet that miscreants could take command of … Read more

Posted in Data Protection, Governance, Risk and Compliance, Mobile Security, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Windows 8.1 Upgrades Security Measures

Software giant Microsoft has unveiled the new security measures in Windows 8.1, including fingerprint biometrics, multifactor authentication for BYODs and enhanced malware resistance. Dustin Ingalls, Group Program Manager for Windows Security & Identity, in a blog this week, listed the major features as trusted hardware, modern access control, sensitive data protection and malware resistance. “Trusted hardware is a key investment … Read more

Posted in Data Protection, Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Industrial Plants Can Be Disrupted With a Remote

The wireless control systems used at many major infrastructure facilities have vulnerabilities which could allow a hacker with a radio frequency (RF) transceiver to close down a plant from up to 40 miles away; two security researchers told the Black Hat convention in Las Vegas. Lucas Apa and Carlos Mario Penagos Hollman of IOActive said in a presentation that they … Read more

Posted in Governance, Risk and Compliance, Mobile Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment