Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ... Tokenless two-factor authentication defies “Heartb... » London: The existence of Heartbleed, a vulnerability in the OpenSSL open source software, was recent... Advanced application security now standard on Barr... » Basingstoke:  Barracuda Networks, Inc. has announced that it will offer advanced application securit... Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ... Tyco UAE and CNL Software partner for major UAE pr... » CNL Software has partnered for an iconic security management project with Tyco Fire & Security UAE, ... Cubic unveils new corporate branding » SAN DIEGO, Calif.: Cubic Corporation has introduced its new corporate brand identity. The name Cubic... Taxware acquires VAT Resource...enhances value add... » Wilmington, MA.: axware, a global provider of sales, use and value added tax (VAT) compliance softwa... Courion expands international footprint with two n... » London, UK: Courion has announced two new hires in the UK and the Middle East to help boost its stra...

CLICK HERE TO

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Case Studies

LONDON, UK: nCircle, the leader in information risk and security performance management solutions, has announced the results of a survey of 205 attendees to the RSA® Conference 2013 in San Francisco, California.

 

Survey findings include:

· 59% of respondents say firewalls are no longer effective against state-sponsored cyber attacks

· 48% said antivirus software is no longer effective against state sponsored cyber attacks

· 39% said intrusion detection systems (IDS) and intrusion prevention systems (IPS) are no longer effective against state-sponsored cyber attacks

· 50% of respondents say their organization is a potential target for state-sponsored cyber attacks

· 48% of respondents say China has the most advanced capabilities for state-sponsored cyber attacks, while 33% believe the U.S. has the most advanced capabilities

Tim ‘TK’ Keanini, chief research officer at nCircle said: “Security professionals know we all live in a world where state sponsored attacks are common and they also know that many legacy security systems that are updated after exploits or malware become public knowledge are no longer effective against these attacks. The hard truth is that there is no silver bullet for security."

Keanini added: “What is surprising about these figures is that only 50% of cyber security professionals believe their organizationis a potential target for state-sponsored cyber attacks. I would say the real figure is much higher. Attacks are so stealthy most organizations are unable to detect when they are being attacked.

Keanini also notes that public perception of the country with the most advanced nation state cyber attack capabilities has clearly been shaped by recent media coverage. “The reality is that nations that are really good at cyber attacks don’t make the news because they don’t get caught.