Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
Save Mart, the Modesto, Calif.-based grocery chain, now confirms that skimming devices are to blame for the data breach believed to have exposed hundreds of consumer accounts to debit and credit card fraud.
Unfortunately, user accounts with reduced privileges do not provide protection from attack, misuse or compromise. Reduced privileges for end-users can only be regarded as one part of an effective security strategy that should not be solely relied on. Organizations should know the limitations of this approach to...
"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
Executives in a variety of industries who are in charge of securing their enterprises' IT say they're more anxious about outsiders hacking into their systems than insiders - either maliciously or inadvertently - threatening their digital assets, a new survey shows.
"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
Homeland Security Secretary Janet Napolitano says the government will fully deploy the Einstein 2 threat detection system by year's end and will begin implementing in 2011 Einstein 3, with the aim to automatically detect and disrupt malicious cyber activity.
The evolution of IT security requires human ingenuity. Machines are fast but dumb, yet using human brainpower can help reject quickly harmful traffic aimed to damage critical IT systems, says Phyllis Schneck, McAfee CTO/public sector.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.