Security Versus Compliance: What’s the Difference?

Security is the pursuit of perfect protection through ongoing tightening of defenses and preemptive activities to cover vulnerabilities.  Risk management, on the other hand, is a discipline that enables organizations to operate and measurably improve their security and compliance environments according to legal standards. Most companies are not accustomed to thinking of information as a…

Details

eSentire Raises $14 Million in Series C Round

eSentire, a Canadian technology and security services company, said on Tuesday that it had raised $14 million in a series C investment round led by Georgian partners, with Cisco Investments and Northleaf Venture Catalyst Fund taking part. eSentire said that it secures the networks of more than 450 financial services companies, law firms and healthcare…

Details

Salesforce Under Cyber Attack; Issues Malware Warning

Attackers are targeting Salesforce users with malicious emails designed to trick victims into downloading the Dyreza malware onto their computers, the software-as-a-service giant warned customers earlier this week. Salesforce said it was not aware of any customers who have been affected by the attacks. The attackers have not compromised Salesforce systems. The attacks typically utilize…

Details

5 Strategies to Combat Shadow IT

In today’s businesses, it seems like the technology landscape is changing ever more rapidly. For most firms, IT has become a veritable parade of transformative and disruptive technology: cloud, mobility, BYOD, Internet of Things – new technologies keep coming down the pike that call for new strategies, new technologies, and new processes to keep organizational…

Details

Cloud Data Security – Control, Privacy, Trust

The latest iCloud photo leak news makes for interesting conversation – both with friends and family as well as business leaders. Yet not surprisingly, many are entrusting their digital lives and their business with something they know very little about. Is this the epitome of trust? Just do what others did; it’ll be fine? This…

Details

Home Depot Continues Investigation Into Reported Breach

Home improvement retailer Home Depot is still investigating a possible breach where cyber-criminals may have stolen credit and debit card details from nearly all of its 2,200 stores in the United States this year.  Krebs on Security first reported the alleged breach on Tuesday. Home Depot CEO Frank Blake told investors at the Goldman Sachs…

Details

Veritas Capital Agrees to Acquire BeyondTrust for $310 Million

Veritas Capital, the New-York-based private-equity, firm has agreed to buy BeyondTrust Software Inc., a provider of privileged account management and vulnerability management solutions, a statement by the security vendor said. Bloomberg reported that Veritas, which has been an investor in BeyondTrust since 2006, would pay $310 million. A Phoenix-based company, BeyondTrust said it has experienced revenue CAGR of…

Details

IEEE Launches Center for Secure Design with Google, Twitter, Harvard and Others

Google, Twitter, and HP are teaming up with 10 other technology companies and universities to help developers design secure software and write better code. An initiative under the Institute of Electrical and Electronics Engineers (IEEE) Computer Society, the new group focuses on practical recommendations for secure software design. The other founding members of IEEE Center…

Details