Wed11142018

Last update01:56:20 PM GMT

Expert Witness : Technology

ISACA Survey: Online Christmas Shopping – grab a bargain- but what’s the risk?

expertwitnesssmartphones

 

Employees potentially increasing risk as they use corporate smartphones—or personal smartphones that they also use for work—to shop online.

London, UK – 15 December 2011 - More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites—as well as perform work activities or even connect to the company network. And with the holiday season fast approaching, it is perhaps not surprising that more than half of employees in the UK will do more online shopping this year than they did last year. According to ISACA’s 2011 Shopping on the Job: Online Holiday Shopping and BYOD Security survey, 50% of UK employees questioned will use their smartphones to shop online between early and mid-December. As the line between personal and work devices continues to blur, potentially putting corporate data at risk, it is critical for companies to embrace the technology, and educate their employees on the risk.

Last Updated on Thursday, 15 December 2011 14:09

Read more...

IT Security staff in Festive Season hacking bonanza

 

computer
One in four IT security staff admits to abusing administration privileges to pry

London – December 5th, 2011 Lieberman Software Corporation, the Pioneers of Privileged Identity ManagementSM (PIM) and leading information security specialists, today announced that analysis of their 2011 password survey has shown that IT security staff will be some of the most informed people at the office Christmas party this year. A full 26 per cent of them admit to using their privileged log in rights to look at confidential information they should not have had access to in the first place.

Last Updated on Wednesday, 14 December 2011 11:33

Read more...

Ten Vital steps for Successful Cloud Computing Implementation

Your Expert Witness Costas GalonisCostas Galonis, CTO of Cloud provider Cirrus Stratus, takes you through the ten steps to check off on your to-do list before committing to the Cloud.

If you are wading through the sea of words which has been written about Cloud computing in the last few months you can be forgiven for being a little confused. Not only is Cloud computing a new concept, the literature about it is also weighed down with new ideas and words such as virtualization, multi-tenancy etc. Since Cloud computing is a new way of doing business you have to be clear about what you are letting yourself in for. For some, the business benefits of Cloud are many – for others it will be the simple fact that Cloud allows a small business to stop worrying about its IT - something that distracts from its core function of running the business

Last Updated on Thursday, 28 June 2012 09:45

Read more...

Tufin Technologies survey reveals most organizations believe their change management processes could lead to a network security breach

93% of the Respondents Conduct Firewall Audits Manually; 60% Cited Lack of Time is the Weakest Link in Network Security; Reported Cheating on Audits Has Doubled Since 2010

Ramat Gan, Israel, November 16, 2011 - Tufin Technologies, the market-leading provider of Security Lifecycle Management solutions, has found that 75% of organizations believe their current change management processes could put them at risk of a security breach. Having sampled 100 network security professionals directly involved in firewall management and auditing, this year's survey reveals that manual processes - and the time constraints they create - are the biggest challenge facing today's network security professionals.

Last Updated on Thursday, 28 June 2012 09:46

Read more...

Lieberman Software says questions remain on EDF hack of Greenpeace

Your Expert Witness Philip LiebermanCommenting on the prison sentences handed down to the former members of EDF’s security staff - and a 1.5 million euro fine on his employers – Lieberman Software says that the only surprise is not having seen this sort of trojan-assisted industrial espionage reaching the courts before.

Philip Lieberman, President and Chief Executive of the privileged identity management specialist, said that the case of EDF being hit with a severe fine - after a senior official hired an external company to use a trojan to spy on Greenpeace - is notable because the saga started more than five years ago.

Last Updated on Thursday, 28 June 2012 09:49

Read more...