Articles about information security

Symantec, Intel carve out diminishing slice of growing security market

Worldwide security software revenues rose 3.7 per cent to reach $22.1bn in 2015, according to analyst Gartner. Security information and event management (SIEM) remained the fastest-growing sub segment of the cybersecurity biz last year, experiencing 15.8 per cent growth. By contrast, consumer security software recorded a 5.9 …
John Leyden, 14 Jul 2016
Raytheon Patriot

Raytheon borgs Websense to create cybersecurity behemoth

Defence giant Raytheon has agreed a deal with Vista Equity Partners to form a new company combining Websense with Raytheon Cyber Products. The new joint venture (Raysense? Webtheon?) will combine Raytheon Cyber Products with Websense's TRITON line of web filtering and other enterprise security products. Raytheon – known for …
John Leyden, 20 Apr 2015
Data breach image

Look out: That data protection watchdog can bite

Despite all the furores, calamities and Snowden-related shenanigans of recent years, the UK’s privacy watchdog remains something of a pussycat, and a lean one at that. Granted powers in April 2010 to fine firms £500,000 for breaches of the various laws it covers, the Information Commissioner’s Office (ICO) has flexed its mini- …
Tom Brewster, 26 Nov 2014

CryptoLocker victims offered free key to unlock ransomed files

Security researchers have released a tool that allows victims of the infamous CryptoLocker ransomware to unlock their computers at no charge. DecryptoLocker from net security firm FireEye and threat intelligence company FoxIT offers a cure for the estimated 500,000 victims of CryptoLocker. Victims need to upload a …
John Leyden, 6 Aug 2014

Japan needs 80,000 EXTRA info-security bods to stay safe

Japan has an 80,000 shortfall in infosec professionals, and needs to provide extra training for more than half of those currently in the industry, if it’s to protect key IT systems from attack, according to the government. A government panel of information security experts met back in June to draw up a long term plan to …
Job cuts jpeg

Layoffs at EMC's RSA security division

RSA, the security division of EMC, has confirmed plans to restructure its business, a move than means an unspecified number of long-term staffers will be shown the door. Details are scarce, for now, but RSA said that it plans to make new hires that will more than offset job losses by start of 2014. It wrote in an email: …
John Leyden, 20 Sep 2013
Great Wall of China

China: Online predator or hapless host?

Analysis The People’s Republic of China has been singled out in increasingly unequivocal language by the US and its allies as one of, if not the greatest, source of online attacks, be they perpetrated by criminals or the Chinese state itself. But amid all the anti-Beijing bluster, has China been given an unfairly bad rep? At first …
Phil Muncaster, 13 May 2013

'Four horsemen' posse: This here security town needs a new sheriff

As the overpriced beers flowed and dusk approached in central London pubs surrounding the venue of RSA Europe last week, talk often turned towards the (ISC)2 security certification body. (ISC)2, which administers the widely recognised Certified Information Systems Security Professional (CISSP) qualification, was "a waste of …
John Leyden, 18 Oct 2012

Taiwan's civil servants caught by sexy email trap

Some 1,000 sex-obsessed civil servants in Taiwan have been sent on an internet security course after being caught in a kind of online honey trap set up by their local government employer. The government of New Taipei City, next door to the Taiwanese capital, sent an email to its 6,000 employees in order to test their resolve, …
Phil Muncaster, 20 Sep 2012

China lays out glorious eight-point infosec masterplan

The Chinese government has released sweeping new information security guidelines designed to enable public and private bodies to protect themselves more effectively against new cyber threats. The State Council’s long list of recommendations spans just about every conceivable aspect of information security, painting a picture …
Phil Muncaster, 19 Jul 2012
The Register breaking news

Infosec 'needs warrior cryptoboffins' to beat hackers

RSA Europe The infosec industry needs to move beyond "faith-based security" to an evidence-based approach that takes ideas from battlefield combat if corporations are ever to get ahead of hackers and keep security spending down to manageable levels. Joshua Corman, director of security intelligence at Akamai, argued that while almost …
John Leyden, 11 Oct 2011
The Register breaking news

MS advises drastic measures to fight hellish Trojan

Updated Microsoft is advising users to roll-back Windows if they happen to be unfortunate enough to get hit by a particularly vicious rootkit. The Popureb Trojan sticks its tendrils so deep into the operating system that the best option is to nuke from orbit return machines to their pre-infected state and change the Master Boot Record …
John Leyden, 28 Jun 2011
The Register breaking news

UK Cyber Security Challenge renewal promises better prizes

The UK's Cyber Security Challenge is promising a renewal of the competition, with more competitions on a broader range of topics and better prizes. The Challenge, successfully run last year as a way of promoting interest in information security as a career and unearthing hidden pools of talent, is once again backed by the UK …
John Leyden, 20 Apr 2011
The Register breaking news

System failure blamed for increasing data breach costs

System failure has replaced negligence as the single biggest source of data breaches involving UK firms, the cost of which rose for the third successive year. The average data breach cost UK organisations £1.9 million or £71 per record, an increase of 13 per cent from the year before, according to a Symantec-sponsored survey. …
John Leyden, 21 Mar 2011
The Register breaking news

World leaders meet to discuss cyberwar rules of engagement

Rules of engagement for the deployment of cyber-weapons need to be developed, an international security conference is due to be told later today. The influential EastWest Institute is due to present proposals for the cyberspace equivalent of the Geneva convention at the Munich Security Conference, which has included a debate …
John Leyden, 4 Feb 2011
The Register breaking news

Half of phish marks respond to scams within one 'golden hour'

Half the victims of phishing emails respond to fraudulent emails within an hour of the receipt of scam messages, according to to a study by transaction security firm Trusteer. Within five hours, more than 80 per cent of the total pool of potential victims have responded, a figure that rises to 90 per cent after the first 10 …
John Leyden, 3 Dec 2010
The Register breaking news

Symantec boss puzzles over McAfee Intel deal

Symantec's head honcho has confidently predicted the security firm will not suffer the same acquisition fate as arch-rival McAfee, which Intel agreed to buy in a surprise $7.68bn blockbuster deal back in August. The McAfee deal is only the high-water mark in a wave of acquisitions that have swept the information security …
John Leyden, 7 Oct 2010
The Register breaking news

Intel needs to rethink security to profit from McAfee buy

Analysis Intel's surprise $7.76bn acquisition of McAfee is not only the biggest pure-play security deal in history, but the most significant statement of intent by an IT superpower since Microsoft launched its Trustworthy Computing initiative back in 2002. Microsoft launched the initiative to develop products that are more secure by …
John Leyden, 20 Aug 2010

Create a news alert about information security, or find more stories about information security.

Biting the hand that feeds IT © 1998–2018