Hi, what are you looking for?
Oracle unveiled Oracle Identity Management 11g Release 2 today, the latest version in its Identity Management platform. With Oracle Identity Management 11g, organizations can securely make the shift to cloud computing and rolling out mobile and social infrastructures, Oracle said. With so many applications living on mobile devices and in the cloud, it's important these applications get the same kind of management and security tools as the on-premise systems do.
By Including The Counterattack in IT Security Strategy Planning, Security Teams Can Quickly Change The Dynamics of a Cyber Attack...Any competent military commander knows that when put in a defensive position, defense forces are never be able to withstand long and sustained offensive attacks. The assumption that the front line of defense will eventually be breached is also true in the realm of the information security battle of defense.
What Should Financial Services Firms Look for to Ensure a Security Technology Can Address Their Needs?Perhaps no industry has a greater need for network and data security than the financial services industry. Widely considered to be ‘critical infrastructure,’ not only are banking and financial market networks handling the life savings of individuals, but the lifeblood of the global economy.
Symantec announced a number of additions to its product portfolio of mobile security solutions Wednesday targeting Google Android, Apple iOS and other mobile operating systems.
Two USB drives containing personal information on 2.4 million voters residing in districts within the Waterloo region of Southern Ontario, Canada were lost three months ago, according to recent disclosures from the agency who oversees general elections in Canada. Offering an explanation as to why Elections Ontario waited so long to release word of the breach, Greg Essensa, their chief electoral officer, said, “I did not want to make an irresponsible public notification or worry Ontarians needlessly.”
Cloud storage provider Dropbox, has taken on outside help in order to investigate a potential breach, which is being blamed as the reason for a sudden spike in spam directed at the service’s users.On Wednesday, users who said that they used unique email addresses when associating with Dropbox were seeing a massive flux in spam.InBoxes targeted by the spammer are seeing advertisements for EU Dice, Euro Gaming Palace, Premier Players Club, Vegas Virtual, SP Casino, and Best2day Support, and this...
ITWallStreet.com, a job board for IT talent looking to work in the financial district, was hacked on Wednesday – leaving some 50,000 users exposed. The attacker, going by Masakaki and claiming roots with TeamGhostShell, said the breach was part of a larger effort that focuses on financial institutions.ITWallStreet.com allows users to “discreetly connect with Wall Street’s IT career community.”
Just days after announcing that Dutch authorities took down two secondary servers used by the Grum botnet, FireEye late Wednesday reported that the entire botnet has been knocked offline, with all known command and control servers left without a heart beat—or at least without connectivity to the Internet.
An Estonian man was sentenced on Wednesday to seven years in prison for taking part in two separate identity theft schemes.
A group of software security experts has issued guidelines designed to reduce the number of exploitable vulnerabilities ending up in production code.
Palo Alto Networks IPO 'Exponentially Oversubscribed' - Revised Price Range Could Value Company At More Than $2.6 Billion on IPO Day
Smart grids were not designed with security in mind, making the entire infrastructure highly vulnerable, McAfee said in a recent report.
The Department of Homeland Security, through its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), issued a warning last Friday about security vulnerabilities in the Tridium Niagara AX Framework, a popular software platform that integrates various control systems and devices and allows them to be managed over the Internet.The scary part? The security flaws were reported months ago, and permanent a fix has not yet been created.
Cyber-criminals are employing new tactics to circumvent the risk analytics engines used by banks to detect financial fraud, Trusteer researchers found.
Zero-day disclosures, new tools and exploits abound in this year's Black Hat conference in Las Vegas. Next week, the Caesar's Palace hotel in Las Vegas will host the 15th annual gathering of the minds in the world of security known as Black Hat USA.
Armed with an extra $22.4 million in its pocket following a Series C financing round announced just over a week ago, AlienVault, the San Mateo, California-based company behind open source SIEM, OSSIM, and the AlienVault Open Threat Exchange, today announced the latest version of its suite of security management products.