by Rebeca | Mar 7, 2014 | News, Resources
The US National Security Agency reportedly took advantage of the vulnerability that has come to be known as the Heartbleed Bug long before the exploit was made public.
The NSA used Heartbleed «to gather critical intelligence,» Bloomberg reports.
The publication says a pair of people «familiar with the matter» revealed to the NSA not only know about Heartbleed for years, but used it to its advantage as well.
Allegedly the agency kept the exploit secret, endangering the online security of millions of people, so that it could continue using it to gather passwords and other types of data.
Complete article by Techradar
by Rebeca | Feb 26, 2014 | Resources
What do 40 percent of folks aged between 18 and 48 never do unless they don’t have a choice? Change their passwords.
It’s one of the many pieces of data uncovered by security outfit Fortinet after canvassing members of both Generation X (ages 33 to 48) and millennials (ages 18 to 32), half male and half female. The resulting poll assesses the generational differences in attitudes toward passwords, personal data security, and privacy.
But the results say at least as much about general attitudes on those subjects across generations as they do about specific differences between generations, especially since the cross-generational differences don’t vary as widely as might be believed.
Complete article by Infoworld
by Rebeca | Feb 26, 2014 | Resources
The five highest performing cloud computing stocks year-to-date in the Cloud Computing Index are Akamai (NASDAQ: AKAM), Juniper Networks JNPR +2.2% (NYSE:JNPR), F5 Networks FFIV +0.81% (NASDAQ: FFIV), Workday WDAY +3.63% (NYSE:WDAY), Fusion-IO (NYSE: FIO) and Riverbed Technology (NASDAQ:RVBD). $10,000 invested in Akamai on January 2nd of this year is worth $13,267 as of market close yesterday (2/21/14).
IBM, Microsoft, Oracle and SAP share prices are included for comparison.
Workday’s (NYSE:WDAY) share price is up 20.79% year-to-date, delivering $12,284 on a $10K investment on January 2nd. Salesforce (NYSE:CRM) is up 15.22%, delivering a return of $11,591 on $10K invested in the same time period. NetSuite (NYSE:N) is up 12.18% for the year, delivering $11,339 on $10K invested. Veeva Systems (NYSE:VEEV) is up 9.19% year-to-date, delivering $10,841 invested on $10K on January 2nd.
Complete article by Forbes
by Rebeca | Feb 8, 2014 | News
The relentless consumerization of enterprise IT policies and practices will extend to mobile device security over the next few years as more and more companies turn to biometric authentication technologies to lock down corporate data and devices.
A new Gartner report predicts that at least 30 percent of organizations will use technology similar to the Touch ID feature on the latest iteration of the iPhone to efficiently and effectively secure and manage mobile devices connected to their networks without irritating users in the process.
«Mobile users staunchly resist authentication methods that were tolerable on PCs and are still needed to bolster secure access on mobile devices,» Ant Allan, a Gartner research vice president, said in the report. «Security leaders must manage users’ expectations and take into account the user experience without comprising security.»
Complete article by ZDNET
by Rebeca | Feb 8, 2014 | News
As the adoption of cloud-based applications increase and more IT departments embrace BYOD, employees, contractors, partners and customers are all accessing corporate applications and data from multiple devices across all global regions. The resulting benefits — productivity gains, customer satisfaction, cost savings and greater efficiency — are met by an increased security risk of exposing sensitive personal and corporate information.
As a result of the proliferation of BYOD, a recent survey of enterprises managing a total of 4.5 million global identities uncovered that 42 percent of IT decision-makers at enterprise-sized businesses are significantly concerned about the security of applications — and the data stored within them — like SharePoint and Salesforce when they are accessed via mobile devices.
Enterprises are left to figure out how to allow anywhere, anytime access to work, while still remaining in control of sensitive company information. Consequently, many are turning to identity and access management (IAM) solutions to help manage user access.
Complete article by Wired