US telecommunications firm IDT has reduced its incident response from 12 hours to 2.5 hours through integration, consolidation and automation. The Newark-based company was dissatisfied with its inability to respond to breaches and isolate affected system in less than 30 minutes on average.
BYOD is so great for so many reasons (For individuals: fewer things to carry around, everything in one place, no device confusion, you can use your shiny new phone more often. For corporations: less expensive, less need for support/IT, fewer whiny employees asking why they can’t use their iPhone/Nexus 5/Surface instead of the boring old […]
The reminders and warnings have been relentless for the past two-and-a-half years. Microsoft will “end of life” Windows XP, but there are significant numbers of computers and specialty devices still running the 13-year old operating system, exposing them to serious security issues down the road. Microsoft officially ends support on Tuesday, April 8 by releasing […]
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say. [Vendors and administrators scramble to patch OpenSSL vulnerability] The flaw, dubbed Heartbleed, makes it possible for an attacker to read a Web server’s memory, which typically includes […]
Target was actually better prepared than most retailers. The real problem lies with the current state of industry threat intelligence and IR practices. A flurry of stories surfaced recently, including those in Bloomberg BusinessWeek and InformationWeek, highlighting signals of compromise that Target apparently “missed” or even “ignored,” resulting in the theft of 40 million credit […]