Recent Articles
-
Data Breaches Increase, but Data Loss Drops
Data loss through cyber-attacks decreased markedly in 2010, but the total number of breaches was higher than ever, according to Verizon’s “2011 Data Breach Investigations Report.” The number of compromised records involved in data breaches investigated by Verizon and the U.S. Secret Service dropped from 144 million in 2009 to only 4 million in 2010,…
-
McAfee Enhances Network Security Platform
Security specialist McAfee announced enhancements to its Network Security Platform, including enhanced botnet control through reputation intelligence, virtual network inspection and a traffic analysis port for network monitoring, forensics and other advanced analysis engines. In addition, real-time, reputation-based intelligence through McAfee Global Threat Intelligence provides Network Security Platform users with additional context for enforcing network…
-
HP Fortify Offers App Dev Security Threat Analysis Tool
Hewlett-Packard expanded its security solutions with a new real-time analysis tool based on the company’s Fortify acquisition. The new HP Fortify Real-Time Hybrid Analysis allows organizations to discover the root cause of software vulnerabilities by observing attacks in real time, HP said April 12. With real-time analysis, organizations can proactively reduce business risk and minimize…
-
SafeNet Tries to Lure Away RSA SecureID Customers
SafeNet has unveiled migration bundles to provide organizations with a full-fledged authentication platform as an alternative to what they currently have deployed. SafeNet’s trusted authentication system is flexible enough to support enterprises regardless of whether they want to deploy hardware or software tokens, smart cards or even mobile devices, the company said April 13. SafeNet…
-
Toshiba Announces Security Feature for Self-Encrypting Hard Drives
Electronics company Toshiba announced a family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host. The Self-Encrypting Drive (SED) models are designed to enable original equipment manufacturers (OEMs) to configure different data invalidation options that align with various end-user scenarios. Designed to address the increasing need…
-
Congress Wants More Information on Epsilon Data Breach
Each day, a new company is added to the list of clients affected by the massive data breach at email marketing provider Epsilon. Now, several U.S. senators and House representatives are demanding more details about the magnitude of the breach and how the email thefts are impacting consumers. U.S. Sen. Richard Blumenthal of Connecticut wrote…