Fortify on Demand provides integrated static and dynamic security testing for assessment of internal and third party applications

 

London, December 9, 2009 – Fortify® Software, the market leader in Software Security Assurance (SSA) solutions, announced today the availability of Fortify on Demand, its comprehensive software security suite delivered via Software-as-a-Service. Fortify on Demand integrates Fortify’s market-leading static analysis technology with dynamic application security testing powered by WhiteHat Security, allowing organizations to assess and remediate security vulnerabilities in applications without installing software on-premise.

 

“As the number of data breaches resulting from attacks against enterprise applications continues to grow, there is a real need for software security technology that is quick and easy to implement while still providing a thorough assessment of your code,” said Barmak Meftah, Senior Vice President of Products and Technology at Fortify Software.

Read more: Fortify Software Launches Hosted Software Security Suite

Imperva delineates five key security trends Organisations will face during the next ten years 

London, 08 December 2009: As we approach the dawn of a new decade, battle lines are firmly drawn with Organisation’s squaring up to Cyber Criminals.   Imperva, the Data Security leader, predicts five key security trends to watch for over the next ten years:

 

  • The industrialisation of hacking - Clear definitions of roles are developing within the hacking community forming a supply chain that starkly resembles that of drug cartels. The weapons of choice will be automated tools applied through botnets. Imperva recently tracked and analysed a compromise that affected hundreds of servers. The scale of this attack, and others like it, is enormous and would not be achievable without total automation.
Read more: Industrialisation of Hacking Will Dominate The Next Decade

THE UK’s desperate attempts to achieve energy security by 2015 are hamstrung by an archaic planning system, poor infrastructure and complex and ever-changing legislation, according to a new report.

Experts predict that 2015 will be the year in which demand for energy outstrips supply in the UK, an unthinkable situation for an economy already deeply mired in debt. However, too little is being done to pave the way for low carbon generation to come to the fore, according to the North East Chamber of Commerce’s Energy Policy Working Group.

Read more: Archaic system and complex red tape threaten UK energy security

Gold Lock, a provider of secure mobile communications devices and computer-based encryption products, increases its $100,000 reward to $250,000 for anyone that can defeat the company’s voice encryption protection.

Tel Aviv, Israel , 7th December 2009 – Gold Lock (www.gold-lock.com), a leading provider of military-grade secure mobile communications devices and data encryption tools, wants more spies, hackers and professional communications eavesdroppers to try to unseat the company’s position as a top provider of secure voice and data solutions. To make sure word hits the streets, the company has increased the reward to $250,000 in pure gold.

It was just a month ago that Gold Lock announced its $100k Gold Challenge. The company posted a sample encrypted telephone conversation on its web site and invited anyone to download and decrypt it.

Read more: Data and Voice Encryption Company Ups the Ante to $250,000 in Gold to Flush Out Hackers and Spies

4th December 2009 - Reports that a pub client of The Cloud - the public access WiFi service - has been fined eight thousand pounds after a customer downloaded a file illegally, sets a very dangerous precedent, says Tamar Beck, a spokesperson for the organisers of Infosecurity Europe.

"The Cloud's business model is similar to that of a wireline ISP - namely providing an Internet connection in return for payment - and the wireless ISP's clients then sublet their service to their customers either for payment, or for free, depending on the type of establishment," said Beck.

 

"In this case it seems the pub chose to offer its WiFi service for free and an anonymous customer downloaded a copyright item, which the copyright owner then pursued the owner of the IP address - in this case the pub - for," she said.

Read more: Eight thousand pound pub WiFi fine sets dangerous precedent