Listen as experts from Barcoding, Inc., Motorola Solutions, and Verizon discuss the challenges and opportunities with BYOD (Bring Your Own Device). Filmed by SupplyChainBrain at the 2012 Barcoding, Inc. Executive Forum in Baltimore, MD Click here to learn more about Aruba’s wireless networking solutions
TurboTax’s Anti-Fraud Efforts Under Scrutiny
Two former security employees at Intuit — the makers of the popular tax preparation software and service TurboTax – allege that the company has made millions of dollars knowingly processing state and federal tax refunds filed by cybercriminals. Intuit says it leads the industry in voluntarily reporting suspicious returns, and that ultimately it is up to the Internal Revenue Service to develop industry-wide requirements for tax preparation firms to follow in their fight against the multi-billion dollar problem of tax refund fraud
SolarWinds Scalability for the Enterprise
For more information, visit: http://www.solarwinds.com/extensions/ SolarWinds IT monitoring and management products have been built to scale to the largest and most highly distributed environments…
PCI-DSS 3.0: The ‘Security Path’ to Compliance
Security and compliance are often used synonymously, even by techies. You can ensure compliance by remaining secure; but mere compliance with certain rules and regulations does not necessarily mean your network is ‘absolutely’ secure. Many organizations, including some of the world’s prominent enterprises have faced IT security breaches and compromises despite remaining fully compliant with numerous regulations
Sophos UTM Connected (9.1) – Maintenance release information
This highly anticipated release has had the fastest uptake of any release in our UTM history.
IT-Harvest Interviews Fortinet’s John Maddison (video)
In the following video, IT-Harvest’s Richard Stiennon interviews John Maddison, Fortinet’s vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company’s product line and the company’s technology innovation.
Preventing DDoS: What to Look for in a Security Solution
Distributed Denial of Service (DDoS) attacks are on the rise, and they’re only getting stronger. This was driven home by The New York Times report on how anti-spam organization Spamhaus fell prey to one of the largest DDoS attacks in history. Few can forget the targeted DDoS assaults on global financial institutions JP Morgan Chase, Wells Fargo and Bank of America, Regions Bank and American Express – attacks that crippled the businesses for hours and cost millions in lost business, rem…
Tufin Talks ‘Magic’ in Network Security Abstraction
There’s no shortage of reports on the latest network security breaches. Each incident holds its own valuable security lesson but it’s beneficial to recognize the incremental successes paving the way to progress. That’s exactly what Reuven Harrison of Fortinet’s solution partner Tufin did in a blog published last week.
The Honeywords Solution
It’s rare that a week goes by without headlines of data breaches or malware attacks – or the introduction of a solution to stop them in their tracks. The latter is increasingly important, thanks to a rash of exploits on LivingSocial, eHarmony, Sony and Evernote – all part of a long, growing list of high-profile targets. The latest, greatest remedy is what researchers at MIT and RSA have dubbed “honeywords” – a new way to deter hackers from leveraging data…
11MB for a simple conference program application?
As I was following the tweets of IEEE S&P, one of the top academic conferences on security, I saw they had created a special application for the people attending the conferences, with the agenda, paper abstracts and a few news. Figure 1. IEEE Security & Privacy Android application Curious, I downloaded the application for Android (air.org.computer.confprog.sp.apk) and ran it through my automated analysis scripts.