Los Angeles, CA, USA (22 July 2009)—At ISACA’s International Conference in Los Angeles this morning, security professional John Pironti called for a sweeping change in how enterprises deal with information security.   “Security by compliance is no longer working,” said Pironti, who is president of IP Architects and an ISACA volunteer. “The number and impact of security breaches have dramatically increased in the last couple of years, even though companies were in compliance with standards like PCI, GLBA, FFIEC, FISMA and others.”   If organizations continue to focus on security by compliance, he argues, the adversaries will continue to win as their attacks become more effective and more damaging. “Compliance can be a good starting point for securing information infrastructure and data if an organization has not put anything in place previously, but it cannot be the end point of the conversation.”  

Read more: ISACA Leader Calls for Fundamental Changes to Information Security

Rolling Meadows, IL, USA (21 July 2009)—Emil D’Angelo, CISA, CISM, senior vice president at the Bank of Tokyo Mitsubishi UFJ, New Jersey, USA, was elected international president of ISACA—a global association serving 86,000 IT governance, assurance and security professionals in 160 countries—at its 37th annual International Conference in Los Angeles, California, USA, today.

Now in its 40th year, ISACA develops international standards for information systems auditing and control; provides education and training; and administers the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM) and Certified in the Governance of Enterprise IT (CGEIT) designations. Additionally, ISACA publishes COBIT—the internationally accepted framework for IT governance best practices—and Val IT, a tool set for unlocking the value of IT and managing IT-enabled business change.

Read more: ISACA Names New International President:Emil D’Angelo Elected to Lead the Association

Basingstoke, 16th July 2009 - News that Twitter has been hacked yet again comes as no surprise, given the fact that many IT staff are and managers are being pushed into adopting cloud computing services on a fasttrack basis, says Origin Storage, the storage systems integration specialist.

"Our observations suggest that a number of companies and their staff are being forced down the cloud computing route and are having to adapt their IT security systems on the fly." said Andy Cordial, Origin Storage's managing director.

 

"We have had concerns about this rate of change in the business sector for some time and, with all the data breaches occurring on the cloud front, it's obvious that the chickens are now coming home to roost," he added.

Read more: Twitter hack caused by lack of security policies says Origin Storage

Burlington, MA & Redwood Shores, CA, 15th July, 2009 – The hacker attacks on Web sites in South Korea - which spilled over to selected US government sites last week - were almost certainly orchestrated by hackers sympathetic to North Korea, but the attacks could have been organised by anyone with a modest budget, says Imperva, the data security specialist.

 A raft of Oracle security flaws - which were fixed on Wednesday of this week - are potentially serious and, as a result, Imperva, the data security specialist, is recommending that all users of Oracle's software products should patch their applications without delay.

 

According to Amichai Shulman, Imperva's chief technology officer, the fact that Oracle has issued 33 patches - 10 of which are sealing vulnerabilities in Oracle's database server offering - indicates the severity of the problem.

Read more: New Oracle security flaws facilitate data leaks according to Imperva

London, 14 July 2009 – Comsec Consulting, a European market leader providing information security consulting services, today launches a new application security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat Identification. CODEFENDTM is an on-demand service allowing developers to securely send their non-compiled code to Comsec, where it is analysed for security vulnerabilities and threats. Fusing the latest generation of code analysis tools, customised rules and Comsec’s proprietary methodologies, the service delivers more accurate reporting and identifies vulnerabilities not routinely picked up when using a ‘tool only’ approach.

Read more: Comsec Consulting Launches CODEFENDTM Security Code Review Service