Farnborough, United Kingdom, 7th January 2009 - Finjan Inc., a leader in secure web gateway products, says that a video news item just published, which shows how easy it now is to manufacture cloned debit and credit cards, confirms the findings of the company's Q2 2008 trends report.

"That report, from our Malicious Code Research Center, highlighted the fact that organised crime is now highly active when it comes card fraud, and bears an uncanny resemblance to organised crime organisations such as 'La Cosa Nostra,'" said Yuval Ben-Itzhak, Finjan's Chief Technology Officer.

Read more: Card fraud factory revelations confirms organised e-crime groups

CREDANT Protector Prevents Malicious Code Attacks, Enables Control of Data Ports on DoD and Civilian Networks

London – January 7, 2009 – CREDANT Technologies®, the market leader in endpoint data protection solutions, announced today the launch of CREDANT Protector, its endpoint data leakage prevention solution that offers government agencies comprehensive device and wireless port control, as well as extensive optical media (CD/DVD) encryption capabilities. CREDANT Protector provides government agencies with an unprecedented level of protection for their sensitive data, allowing authorised government employees to utilize removable media to further the agency mission while eliminating the risk that sensitive data may be lost, stolen, or corrupted.

Read more: CREDANT Launches Endpoint Data Leakage Prevention Solution to Protect Government Data from Cyber...

Companies warned to safeguard competitive and sensitive data from disgruntled employees facing redundancy

 

London 22nd December 08 – Sixty percent of office workers faced with redundancy or the sack admit they will take valuable data with them, if they could get away with it!  40% are downloading sensitive company secrets right now under their bosses nose in anticipation that they could lose their job.  That’s the findings of a survey by IT security experts Cyber-Ark from research they carried out into “The recession and its effects on work ethics” amongst 250 office workers in London’s busy Canary Wharf.

Read more: Industrial Espionage Escalates as 60% of redundant workers take secrets!

 19th Dec 08 Credant, the military grade endpoint encryption specialist, says that the privacy storm over a stolen laptop and hundreds of intimate pictures of the Duchess of York's family, could have been avoided with a little IT security and forward planning.

 "Newspaper reports that a laptop containing pictures of the Duchess, together with photos of her two daughters and ex-husband Prince Andrew was stolen from a photographic studio is a severe privacy invasion that simply should not have happened," said Michael Callahan, Credant's senior vice president and chief marketing officer.

"Given the fact that the Royal Family was involved with the pictures held on this laptop, the data should have been encrypted - full stop.

Read more: Duchess of York laptop photo fiasco could easily have been avoided

Leading insurance provider puts customer experience management at the heart of its Web strategy, helping with TCF compliance and fraud reduction

London, UK – 18th December 2008 – LV= has selected Tealeaf, the leader in online Customer Experience Management (CEM) software, to help enhance the experience of its customers using www.lv.com. Tealeaf will work with LV= to meet and exceed compliance criteria under the FSA’s Treating Customers Fairly (TCF) initiative and will provide LV=’s contact centres with visibility into the online customer experience, by linking both the online and offline channels. In addition, Tealeaf® CX solutions will enable LV= to optimise its website, by identifying, quantifying and removing obstacles that hamper the online visitors’ journey.

Read more: Tealeaf Proves LV= Treats Customers Fairly