Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ... Tokenless two-factor authentication defies “Heartb... » London: The existence of Heartbleed, a vulnerability in the OpenSSL open source software, was recent... Advanced application security now standard on Barr... » Basingstoke:  Barracuda Networks, Inc. has announced that it will offer advanced application securit... Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ... Tyco UAE and CNL Software partner for major UAE pr... » CNL Software has partnered for an iconic security management project with Tyco Fire & Security UAE, ... Cubic unveils new corporate branding » SAN DIEGO, Calif.: Cubic Corporation has introduced its new corporate brand identity. The name Cubic... Taxware acquires VAT Resource...enhances value add... » Wilmington, MA.: axware, a global provider of sales, use and value added tax (VAT) compliance softwa... Courion expands international footprint with two n... » London, UK: Courion has announced two new hires in the UK and the Middle East to help boost its stra...

CLICK HERE TO

CTE 2014

 

pentestmag.com

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Useful Links

SIA Logo

Who's Online

We have 39 guests online

New York: Options has announced that it has upgraded the route between the firm’s data center facilities in Carteret and Weehawken, New Jersey (NJ2). The newly upgraded link reduces one-way latency on the route by 6.7% and sees the IaaS provider offer customers the fastest route currently available between both venues.

London: As the adoption of cloud computing continues to grow across the world, security, privacy and regulation of data in the cloud are becoming more prominent and relevant than ever before. This year’s Cloud World Forum conference and exhibition will provide a platform for leading solution providers and delegates across multiple industries to examine the risks, and explore the solutions to these growing concerns.

Gothenburg: A study, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas (USA), has found that at least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information to which they are not entitled. It also found that, of the 19% of respondents whose organizations do not allow sensitive information to be stored within SharePoint environments, nearly a quarter of them later confessed they knew of individuals who had accessed content that they were not entitled to, demonstrating that users were ignoring this directive. Most alarmingly of all, the majority of administrators perceive their ‘permission’ to be unrestricted - responding with comments anecdotally that included ‘I am entitled to see everything’ and ‘Administration access is God mode’. This incomprehension is testament that, albeit unintentionally, many SharePoint administrators are in fact abusing their privileged access rights, ultimately putting confidential data at risk.

AlgoSec has announced the results of “The State of Network Security 2014,” a survey of 142 information security and network operations professionals, application owners and compliance officers conducted during the RSA Conference in February 2014.

London: Those who come in through the back door often have something to hide - and this also applies to the IT scene. For example, data spies can use back doors in token-based authentication solutions to steal information about companies. The company SecurEnvoy will be explaining how businesses can protect themselves from such prying eyes on stand H10 at Infosecurity Europe (29 April to 1 May, London). In a keynote entitled “Revolutionising 2FA to enhance the user experience", Andrew Kemshall and Phil Underwood will look at the two-factor authentication solutions available on the market. They will also discuss security aspects relating to seed records, which are specific algorithms used to create passcodes for user identification.

Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more than $5 million from the U.S. Air Force to supply its P5 Combat Training System (P5CTS) to the Moroccan Air Force. Morocco will join the United States Air Force, Navy, and Marine Corps, along with a number of international air forces, in using the P5CTS to support high-fidelity, TOPGUN-style live and post-mission training. The P5CTS will be used by Moroccan pilots who fly the recently-delivered F-16 aircraft.

London, UK: Becrypt will be demonstrating tVolution Mini, the latest addition to its range of innovative secure mobility solutions at InfoSec Europe. tVolution Mini is a secure miniature computer the size of a credit card which plugs directly into the HDMI port of a monitor or TV and, along with a keyboard, mouse and wireless internet access, enables user-friendly fully-managed secure remote access to a corporate network at an incredibly low cost. tVolution Mini is suitable for use by security conscious organisations across all industry sectors that need to provide mobile workers with a highly portable secure end point, while avoiding the expense and overhead of a fully-loaded laptop. This includes central and local government and other public sector organisations that need to access OFFICIAL tier information - one of the three levels of the new UK Government Security Classifications (GSC) policy which replaces the former government protective marking scheme.