18th November 2009 - BBC newswire reports of serial laptop thefts on the route of the West Coast main rail link highlight the dangers of accessing company data on a portable computer whilst on the train, says Origin Storage. According to Andy Cordial, managing director of the storage systems integration specialist, whilst the laptop thief has been captured on CCTV - and his image published on the BBC news site - the Carlisle-Crewe rail line is a busy route. "Added to which the section of the line on which the laptop thief appears to be operating, the Stockport-Manchester one, is one of the busiest outside of London, with Manchester Piccadilly station offering a lot of escape routes, and he's going to be difficult to catch, especially if he changes his appearance," he said. "Whilst the theft of a laptop - costing several hundred pounds - is a serious issue, there's also the often-insurable problems caused when company data goes walkabout, especially if that data includes customer and/or employee personal details," he added.

Read more: Serial train laptop thefts highlight need for encrypted drives says Origin Storage

ANDOVER, Massachusetts, Nov 17, 2009 – With the transition to 10 Gbps networks, there is increasing emphasis on increasing the performance of Intrusion Prevention Systems (IPS) to keep up with higher data rates. High-Performance IPS provides in-line processing of network traffic in real-time and has traditionally required expensive systems based on proprietary hardware platforms. With the introduction of Napatech’s family of In-line network adapters, an alternative approach based on standard off-the-shelf server hardware was made possible.   This approach can help to reduce the time, cost and technical risk associated with development of high-performance IPS.   Napatech’s In-line adapters provide multi-port 1 Gbps and 10 Gbps packet reception and transmission at full line-rate. Based on PCI-Express, the network adapters can be deployed in standard x86 servers to provide a powerful, full throughput platform for high-performance IPS solutions.  

Read more: GROUNDBREAKING APPROACH TO INTRUSION PREVENTION

16th November 2009 - Imperva, the data security specialist, has reported to Yahoo! a potential SQL injection flaw - known as a Blind SQLi problem - on the Yahoo jobs site.

"This is a flaw that could mean that the personal information of large numbers of people are compromised," Amichai Shulman, Imperva's chief technology officer said.

 

"Data like this can be extremely useful as far as identity thieves are concerned. This is exactly the sort of data that is traded on so-called carder forums (http://amazingforums.com/forum1/DAGAME/forum.html)," he added.

Read more: Imperva warns on Yahoo jobs web site hack

Sysec applies identity and access management (IAM) expertise to NPIA IAM project

Reading, UK – Tuesday November 17th, 2009 – Sysec Security Group (www.sysec.co.uk) has been chosen by Siemens Enterprise Communications (SEN Group)[1] to provide identity and access management (IAM) solutions and services to police forces throughout the UK as part of the National Police Improvement Agency (NPIA – www.npia.police.uk) IAM Central Services project.

There are 43 police forces in England and Wales with over 140,000 serving police officers.  In the continuing battle to protect the public against crime and terrorism there is a growing demand to make information more widely available across forces.

Read more: Sysec supports Siemens with Identity and Access Management for UK Police Forces

Reading, Berkshire – November 16, 2009:  Osirium, a new and unique IT security solution was today announced by ex-MIMEsweeper co-founder and industry expert David Guyatt.  Osirium (www.osirium.com) brings together new and established security technologies in a management portal which delivers greatly increased security alongside massive productivity gains.

Guyatt, CEO at Osirium, explains: “Most companies select ‘best-of-breed’ deployment strategies when choosing their critical IT security devices - which makes good sense from a performance perspective. However, each device has different access security policies as well as configuration and management controls and, as a result, policy-based change management and compliance across such a broad asset base of different IT security devices is both costly, insecure and exposes companies to undue risk.”

Read more: IT Security Expert Announces Osirium