Commenting on reports that the hacker group UGNazi gained access to the billing database of WHMCS – a billing service company used by a number of firms – Lieberman Software says that privilege account management could have significantly reduced the risk that this type of incursion would occur.

The core element of this hack was social engineering, and the core element that needed addressing was the automation of identity verification. The hack points out that automated solutions are generally superior to human based solutions in that they cannot be social engineered (they can’t be told a story).  If anything should be behind an automated and secured control, it would be the privileged account management so that this level of access would be not be granted without extensive verification and such access would be granted for a limited period of time and with limited scope.

Read more: Lieberman Software says WHMCS database hack could have been avoided

Today’s mobile device users are demanding to access data from anywhere at any time. In fact, according to an annual ISACA survey on BYOD security, the use of mobile applications has nearly tripled since last year’s survey, and two-thirds of employees aged 18 to 34 have a personal device they use for work purposes. Meanwhile, businesses are trying to reduce costs and simplify desktop management. Virtualized desktop infrastructure (VDI) allows users to access applications and data securely from remote locations with minimal risk of data loss, while simplifying desktop management within the traditional boundaries of the enterprise.

Read more: ISACA Issues Guidance on Virtualized Desktop Infrastructure (VDI)

ISACA—a nonprofit global association of more than 95,000 IT governance professionals—recently released COBIT 5, a business framework for the governance and management of enterprise IT. To answer questions about the highly anticipated framework, ISACA is now offering two free webinars:  A COBIT 5 Overview and 5 Essential Facts About COBIT 5.

5 Essential Facts About COBIT 5 will be held Thursday, 10 May, at 11 a.m. CDT (16:00 UTC). Robert Stroud, CGEIT, member of ISACA’s Strategic Advisory Council and vice president of Innovation and Strategy at CA Technologies, will present an engaging, interactive discussion on the five COBIT 5 principles for governance and management of enterprise IT.

Read more: ISACA Offers Free COBIT 5 Webinars for Business and IT Professionals

 Account Reset Console 6.0 Provides Greater Performance and Scalability for User Account Password Management

Lieberman Software Corporation announced the release of Account Reset Console 6.0, the latest version of the company’s self-service password reset solution. The product permits delegated users to reset their own passwords and unlock their own accounts without involving IT staff, helping organizations maintain high productivity levels while simultaneously strengthening security.

“Account Reset Console is an essential tool in our product line, providing unique capabilities that complete our privileged identity management and Windows security management lines,” said Chris Stoneff, Director of Professional Services at Lieberman Software.

Read more: Lieberman Software Enhances Self-Service Password Reset Capabilities for the Windows Enterprise

Recognition for the 100 most innovative technology companies in Europe.

Manchester (UK) and Boston (USA) - Avecto, the leader in Windows privilege management, announced today they are winners of Red Herring's Top 100 Europe award, a prestigious award that recognises the top 100 private technology companies from the European business region.

Red Herring’s Top 100 Europe list has become a mark of distinction for identifying promising new companies and entrepreneurs. Red Herring editors were among the first to recognize that companies such as Facebook, Twitter, Google, Yahoo, Skype, Salesforce.com, YouTube, and eBay would change the way we live and work.

Read more: Avecto wins Red Herring Top 100 Europe Award 2012