Cisco boasts 100 percent security coverage

Cisco has said it will do whatever it takes, including working alongside competitors, in order to ensure that it has the best security offering that covers customers 100 percent of the time.

Admitting that the 100 percent statement is a “bold claim”, Scott Harrell, VP of Product Management in Cisco’s Security Business Group, explained that it means Cisco will provide protection for customers whether they are on business premises or working remotely.

“What we’re talking about is the fact that you as customers, you as network administrators, as partners, who are trying to find and deploy these complex networks, your problem’s not just a firewall at the edge … your problem’s more than that,” Harrell, speaking at the second day of Cisco Live Las Vegas, said.

“You have diverse infrastructures, you have campuses, you have datacentres, you have branches, you have users that are sales personnel that never come back on-prem, they spend their whole life off-prem and seldom connect back into the VPN, you have applications that you’re being pushed to move to the cloud by your line of business. Continue reading “Cisco boasts 100 percent security coverage”

Homeland Security warns of hackers exploiting SAP security flaw

Homeland Security has warned that hackers are exploiting a security vulnerability in SAP business software — a flaw that dates back to 2010.

The department’s Computer Emergency Readiness Team (CERT) sent an alert on Wednesday warning that at least 36 unnamed organizations are running misconfigured or outdated software, which could leave them prone to remote attacks by hackers.

One of the affected enterprises is said to be one of the top-ten highest annually grossing global companies, and more than a dozen generate over $10 billion in annual revenue per year.

According to the alert, a hacker that successfully exploits the vulnerability can gain full access and complete control to an affected SAP platform — that includes business information and processes on those systems.
Continue reading “Homeland Security warns of hackers exploiting SAP security flaw”

Poor Security Thwarts Three-Quarters of Big Data Projects

Information and analytics make up the new face of innovation for corporates—who hasn’t heard the term “Big Data,” after all. But IT security challenges are getting in the way of executing the vision of dynamic, usable, instantly accessible data frameworks, with three-quarters (73%) of organizations reporting that their business initiatives have been thwarted by data security gaps.

According to a survey from Dataguise, “Strategies for Securing Sensitive Data,” companies are inexorably transitioning toward big data frameworks, including cloud-based environments such as Microsoft Azure HDInsight. In fact, 28% of respondents report more than a year of experience with these big data repositories, and another 38% say they’re in various stages of adoption.

Yet, they’re finding that data security challenges often have a negative impact on their efforts; that 73% said that data security concerns have been so worrisome that in many cases they’ve terminated their projects until further notice.

Even with multiple layers of security in place, less than half of all respondents did not believe that their data was secure, with only 47% of respondents confident that their sensitive data throughout their organization was safe. Continue reading “Poor Security Thwarts Three-Quarters of Big Data Projects”

The CSO 2016 Security Data Analytics Survival Guide

Is big data security analytics still a thing? A handful of years ago security and big data were mentioned in the same breath as one might say peanut butter and jelly, and big data security analytics was the buzz phrase that was buzzing the most loudly in every corner of the security industry. Perhaps the security big data analytics hype machine hit its most fevered pitch in 2013.

Today, we don’t hear quite as much about “security big data.” But that doesn’t mean that it’s no longer relevant. To tweak a phrase familiar from Gartner, the hype is cycling down from the peak of inflated expectations and, hopefully, heading to the plateau of productivity.

Big data security analytics is about using security analytics to improve security and obtain value from cybersecurity efforts. It’s about helping security teams to focus on the threats, vulnerabilities, and security controls that matter.

BAN finds trouble in its own backyard

the Seattle-based group that manages the e-Stewards natural philosophy usage certification program, has revoked that certification for Total Reclaim, saying the city firm “was known by BAN’s e-Trash Transparency Project (an electronic trailing program) to have exported mercury-containing liquid crystal display (liquid crystal display) monitors to metropolis.”

BAN has posted many documents regarding the Total Reclaim state of affairs to its web site, including associate “evidentiary report” and a statement from Total Reclaim’s Craig Lorch and Jeff Zirkle apologizing for the lapses in certification protocol.

“We are terribly sorry that we have a tendency to have disillusioned our business, our customers, our employees and all those that have believed in North American country,” write the duo. Lorch and Zirkle also write, “Economic challenges never excuse wrong behavior. The reality, though, is that squeezed by plummeting commodity prices; increasing labor costs; long, fixed-price contracts; and, especially, a dramatically increasing volume of flat-screen devices, we created a short-run business call to export materials to unsupported process facilities in Hong Kong.”

As part of its e-Trash Transparency Project, BAN says it “placed 200 tiny GPS-based trailing devices into recent printers and monitors and delivered them to Goodwill [Industries] and to numerous recyclers round the country.”

Two caterpillar-tracked devices went from Total Reclaim’s possession to the New Territories of Hong Kong, where units ar disassembled in non-e-Stewards-certified facilities.

A May 9, 2016, BAN news release on the e-Trash Transparency Project additionally scrutinizes the usage partnership between laptop maker holler INC. and Goodwill Industries. BAN says 46 of the two hundred tracker-planted electronic devices were delivered to Goodwill Industries stores within the us which “seven of those later reported their whereabouts in the Asian countries of Asian country, Taiwan and China (mainland and Hong Kong). Six of these were a part of Dell INC.’s Reconnect partnership with Goodwill.”

Says BAN Executive Director Jim Puckett, “Goodwill and Dell have had robust reputations for social and environmental responsibility. Our findings, however, shake the foundations of that public trust and cry for the implementation of immediate reform when it involves e-waste management.”