Audit Finds Taxpayer Data is at Risk; Urges IRS to Take Action

Taxpayer data is at risk as disgruntled insiders or malicious outsiders can exploit security weaknesses and the Internal Revenue Service (IRS) should take action, the US Treasury Inspector General For Tax Administration (TIGTA) said in a report released on Thursday. Based on its annual audit, the TIGTA found that 42 percent (eight) of 19 planned corrective…

Details

Prevent SQL Injection Attacks with DB Networks’ New Core IDS

What is the top threat to web applications today? According to the Open Web Application Security Project (OWASP), it’s SQL injection. The problem is so pervasive that it has topped the OWASP Top 10 list of software security issues for several years in a row, and for good reason. Hundreds of millions of database records have been stolen…

Details

Sometimes Your Employees Go Home; The Case for Securing Home Users

Bring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train their employee user base, even when it’s about apparent non-work related computing resources. Becoming visible to your non-security enterprise end users as a security resource…

Details

Does the NSA Use Quantum Computing to Break Things?

In the continuing stream of revelations about reported NSA hacking to protect national interests comes more news. Data moving between data centers operated by the world’s largest Internet email companies allegedly was intercepted and collected for analysis because the encryption protections on the data was bypassed. The prevailing theories about how the NSA apparently did this…

Details

Boom Times for Cloud Security

Amazon announced several initiatives at its AWS re:Invent conference that are destined to disrupt several markets Held last week in Las Vegas, the Amazon Web Services’ conference hosted more than 10,000 attendees. One such program is Amazon WorkSpaces, an Amazon provided virtual desktop (VDI) product, which will be available for a low monthly fee, starting,…

Details

Gartner Says “Agility” is Primary Driver for Private Cloud Adoption; Predicts Increased Hybrid Cloud Acceptance

Private cloud computing is a “reality” for half of large enterprises with agility being the key driver, according to Gartner, Inc. In a recent research report, “Private Cloud Matures, Hybrid Cloud Is Next,” the industry analyst firm said cost was an important consideration as well. Security, often cited by IT professionals as the key driver…

Details

The Devil Inside the Beltway: Not for the Faint of Heart

The Devil Inside the Beltway is a chilling memoir that documents the shambles made of Michael Daugherty’s life by apparent regulatory overreach on the part of the Federal Trade Commission (FTC) that is still underway. Reading Daugherty’s book is extremely painful for those who know Michael and that number is growing because to read his…

Details

IT Security Salaries Expected to Increase in 2014

IT-security related salaries are expected to climb in 2014, according to a survey released by TEKsystems, which polled some 900 IT leaders including CIOs, IT VPs, IT directors and IT hiring managers, Some 65% of respondents said they expected security salaries to increase. That’s up from a similar survey last year when 40% of those polled forecast a…

Details