Fahmida Y. Rashid

EMC Unveils Five Managed GRC Services

SAN FRANCISCO €” EMC’s consulting division is stepping into the security arena with five new risk management advisory services to help customers secure their data while meeting various regulatory and compliance requirements. EMC Consulting would offer customers end-to-end services designed to handle compliance requirements while considering each organization’s unique set of business needs, the company […]

RSA 2012: LulzSec As a CloudFlare Customer

The CloudFlare team was surprised when cyber-pranksters LulzSecurity signed up to take advantage of its services last year, Matthew Prince, CEO of CloudFlare said Feb. 28 at the RSA Conference in San Francisco. With LulzSec as a customer, CloudFlare had a unique insight into the group’s activities and also the opportunity to discover the security […]

Malware, Hacking Most Common Attacks in 2011 Data Breaches: Verizon DBIR

SAN FRANCISCO€”Malware and hacking were the most commonly used attack vectors in data breaches that occurred in 2011, according to a sneak peek of the 2012 Data Breach Investigations Report from Verizon. Verizon released a preliminary version of its 2012 Data Breach Investigations Report Feb. 29. The preliminary report contains “a few snapshots” from the […]

Police Arrest 25 Alleged Anonymous Members, Angry Hackers Retaliate

Law enforcement authorities arrested 25 individuals allegedly members of the Anonymous hacktivist collective as part of an international operation, according to Interpol. The operation began in mid-February after police traced several high-profile online attacks originating from Argentina, Colombia, Chile and Spain, Interpol said Feb. 28. The attackers allegedly targeted Websites belonging to the Ministry of […]

Big Data Can Boost Security Defenses, Has Privacy Baggage: Microsoft

SAN FRANCISCO€”Big data is popping up in many discussions at this year’s RSA Conference here: both as a way to solve some of the most pressing security problems as well as a reason why individual privacy is at risk. The proliferation of devices and services means more and more information is being collected and made […]

Cyber-Defenses Are About Managing Risk: RSA’s Coviello

SAN FRANCISCO — The sheer volume of attacks against enterprises and governments in 2011 showed that security is critical, but the security industry is “in serious risk of failing” to protect organizations, said Arthur Coviello, executive chairman of RSA, during his opening keynote address at the 2012 RSA Conference. Signature-based and perimeter-heavy defenses no longer […]

F5 Networks: Access Policy Manager

F5 Networks: Access Policy Manager F5 Networks combined mobile device management products from AirWatch, MobileIron, SilverbackMDM and Zenprise into F5’s mobile access platform. Enterprises can reduce the costs associated with mobility deployment and management while gaining control. Full VPN and route control capabilities are also extended to users trying to access applications behind the corporate […]

WikiLeaks’ Stratfor Email Release Raises Uncomfortable Questions

WikiLeaks is back in the news again. This time the whistle-blower Website has released its first set of internal emails stolen from Stratfor back in December. The links to the 167 messages are allegedly just the first installment of the “more than 5 million emails” dating from July 2004 to December 2011, WikiLeaks said in […]

RSA 2012: Mobile Security, Hacktivists, APT, Social Engineering

Thousands of security professionals are planning to descend upon the RSA Conference in San Francisco this week to discuss security issues, ranging from challenges posed by mobile products, to hacktivists, to social engineering, to advanced persistent threats and the cloud. There is something for everyone at the RSA Conference, which begins Feb. 27 at the […]

Zettaset’s SHadoop Brings User Access Control to Big Data

Zettaset unveiled SHadoop, a new security initiative that would help organizations manage and control employee access to data in Hadoop environments. SHadoop would integrate security functions that would allow administrators to implement role-based access control within the company’s Hadoop Orchestrator platform, Zettaset said Feb. 22. With the new tools, administrators can create policies that specify […]