Attract, retain and delight more customers with ZOHO CRM. Click here for a 15-day free trial.
Welcome | Sign In
ECommerceTimes.com


 Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.

Study: Google Play Apps Go Beyond Need-to-Know
November 05, 2012
An analysis of more than 400,000 apps in the Google Play store has revealed that more than 100,000 of them pose a potential security risk to their users. The analysis of the Android apps released last week by cyber security vendor Bit9 examined the security permissions requested by the programs.
Big US Banks Under Active Attack, Napolitano Warns
November 01, 2012
Hackers are actively attacking some of the largest banks in the nation, U.S. Homeland Security Secretary Janet Napolitano warned this week. Napolitano declined to go into detail about the types of breaches or what kind of information -- if any -- had been taken. She brought up her concern about attacks on U.S. financial institutions at a cybersecurity event.
EMC Grabs Silver Tail
October 31, 2012
EMC has announced it is acquiring Silver Tail Systems, a provider of real-time Web session intelligence and behavioral analysis. When the acquisition is closed, which is expected in the fourth quarter, Silver Tail will be part of EMC's security division, tasked with extending RSA's enterprise security portfolio.
Stopping the PhD Cybercriminal
October 15, 2012
The concept of intelligent containment of risk is an important approach to overall IT security. In today's environment, rapid and proactive containment of problems and breaches -- in addition to just trying to keep the bad guys out of your systems -- makes sense. To find out what other approaches to data security are gaining traction, listen to today's podcast featuring Kaivan Rahbari, senior vice president of risk management at FIS Global.
Panetta Sounds Clarion Call for Cybersecurity Action
October 15, 2012
While U.S. Secretary of Defense Leon Panetta did some silicon saber-rattling last week by raising the prospect of a preemptive strike against cyberattacks, he also delivered a wake-up call to Wall Street and Congress about cybersecurity. Panetta's message to the business leaders gathered at a meeting in New York of the Business Executives for National Security was very clear.
OpenWorld's Missing Ingredient
October 10, 2012
I went to Oracle OpenWorld as a guest of Oracle and came away with a variety of observations that I can share. Some of what I saw was under NDA and that will remain undisclosed, though I have to tell you that I did not see any labs or next-generation products beyond what my colleagues saw at the show. My secret experiences revolved around customer stories.
Federal Grants Wed Public-Private Cybersecurity Efforts
October 02, 2012
The debate in the U.S. Congress over a comprehensive national cybersecurity program is wearing on, largely because of differences over the roles of government and business in protecting information technology. Elsewhere, however, cybersecurity awareness and research projects are being launched through cooperative efforts.
Easing the Pain After a Security Breakdown
September 28, 2012
With each major public data breach our attention focuses on how to prevent these incidents. A good example is the recent security breach at LinkedIn, in which millions of passwords were stolen. Industry experts and the media immediately started to dissect what LinkedIn had done wrong or what methods or tools should have been used to prevent the incident.
'Need it Here, Need It Now' Drives Capital Markets in the Cloud
September 24, 2012
As an early adopter of innovative cloud delivery and a groundbreaking cloud business model, we decided to go back and see how things have progressed at NYSE. We will learn now, a year on, how NYSE's specialized cloud offerings have matured, how the business of the financial services industry has received them, and explore how providing cloud services as a business has evolved.
Cyberattack Warning Throws US Banks' Security Into High Gear
September 21, 2012
Citing recent threats of cyberattacks, the Financial Services Information Sharing and Analysis Center, an industry body set up by the financial services industry, has raised its cyberthreat level from "elevated" to "high." It points to credible intelligence indicating the potential for distributed denial of service and other cyberattacks against financial institutions.
IT Security Police: 'Step Away From That IE'
September 19, 2012
Internet Explorer is too dangerous to use, according to warnings from throngs of security experts, including Germany's Federal Office for Information Security. The German government agency issued an alert that advises citizens to avoid using Internet Explorer and use an alternate browser until a patch can be found for a vulnerability discovered last week.
ID Theft Gives Apple Another Security Black Eye
September 10, 2012
Once upon a time, security shiners involving Apple were as rare as Windows Vista lovers, but now it seems that a week doesn't go by without the name of Steve Jobs' baby being dragged through the digital mud. Last week's episode involved the hacktivist group AntiSec and the FBI.
In Google Attack Aftermath, Operation Aurora Keeps on Hacking
September 08, 2012
The gang behind Operation Aurora, a coordinated attack that hit Google and tens of other large United States corporations, is alive, well and hacking away, Symantec said. Over the last three years, the gang has used lots of zero-day attacks against not just defense corporations, but also the manufacturers in their targets' supply chains.
Anons Pelt UK Authorities With Cyberattacks
August 21, 2012
Today in international tech news: Hackers deliver their particular brand of justice in the UK and Russia, downing government sites on behalf of Julian Assange in Britain and Pussy Riot in Russia. Also: China and Taiwan are uniting -- by data cables, that is -- while China's top two video platforms could soon merge after a shareholder vote.
Anonymous Makes Mischief With Manufactured Hack Claim
August 16, 2012
The fixes Sony made to its PlayStation Network last year after its system was hacked may not have made it impenetrable: Reports are circulating that the hacktivist group Anonymous has breached the network again. The rumors started with a tweet posted to the group's account that has since been taken down.
'Horrible Problems' May Be Rolling In With the Cloud
August 16, 2012
Why does Apple cofounder Steve Wozniak think cloud-based computing will bring "horrible problems" over the next few years? Sounds crazy, but to tell you the truth I think Woz is correct -- to a point. The more we transfer everything to the cloud, the less control we will have over it, according to Wozniak. That's true -- and that's just one of many issues that must be resolved before we embrace the cloud.
Amazon, Apple Cork Security Holes
August 08, 2012
Amazon and Apple changed some of their security policies this week after tech journalist Mat Honan claimed an identity theft incident involving the two companies allowed a hacker to wipe out much of his personal online data. Both Amazon and Apple put an end to policies that allowed customers to change their account settings over the phone.
Forging Trust Within the Supply Chain
July 30, 2012
Let's examine the latest efforts to make global supply chains for technology providers more secure, verified, and therefore trusted. We'll examine the advancement of The Open Group Trusted Technology Forum to gain an update on the effort's achievements and to learn more about how technology suppliers and buyers can expect to benefit.
Apple to Make Unprecedented Appearance at Black Hat
July 25, 2012
For years, Apple has been able to avoid the bad press about malware infections that has dogged rival Microsoft, but that's changed in recent times, which it may be why the company is participating this week in a high visibility security conference being held in Las Vegas. Apple Platform Security Manager Dallas DeAtley is scheduled to speak at Black Hat 2012 Thursday about key security technologies.
Refining Due Diligence for Enterprise Open Source
July 24, 2012
Most security professionals are probably very comfortable with using open source tools to implement technical security functionality. From nikto to snort to openssh -- there are literally hundreds of well-known, sophisticated, open source tools that perform useful and critical security functions.

See More Articles in Enterprise Security Section >>
ZOHO CRM
More E-Commerce Times Headlines