Stellenbosch based Entersekt, a mobile technology company offering banks an innovative solution for secure online and mobile banking, announced that Nedbank has implemented their interactive transaction authentication (“ITA”) system in their recently released “Approve-itTM” product which will provide greater protection against online fraud for their customers.

Schalk Nolte, CEO of Entersekt says: “Banks worldwide are recognizing the value of using mobile devices as an additional security device for online banking. However most banks currently send “one time passwords” (OTPs) by sms to their customers who wish to execute sensitive online transactions. The weakness in this system is that the customer is then required to enter the OTP onto the Bank’s online site.

Read more: Banking Just Got Safer As Nedbank Collaborates With Entersekt To Strengthen Online Banking?

Infosecurity Europe 2012 welcomes Q4 buoyant security market report

With less than six weeks to go before Infosecurity Europe 2012, the organisers of the annual event have welcomed news that the EMEA enterprise network security market topped the $674 million mark last quarter.

David Rowe, CISSP, member of the Infosecurity Europe Advisory Council and Head of Business Services for Reed Exhibitions - the organisers of the show, which is held 24th -26th April in Earls Court, London - said this figure, which represents a 9.0 pc increase year-on-year – and 12.8 pc over the prior (third) quarter - reflects the fact that IT security is now a critical part of business infrastructure.

Read more: Infosecurity Europe 2012 welcomes Q4 buoyant security market report

The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision-making away from technology specialists to business unit leaders. Eliminating oversight and governance from cloud computing decisions can create significant risk to organisations, effectively undermining any benefits of moving to the cloud and, at the same time, potentially creating serious issues for organizations.

 Only through proper governance and management can cloud computing achieve its potential for organizations. To help enterprises manage the potential pressure points that begin to surface when cloud computing strategies diverge from internally provided IT services or traditional outsourced arrangements, global nonprofit IT association ISACA has issued Guiding Principles for Cloud Computing Adoption and Use, a complimentary guide featuring six key cloud computing principles:

Read more: ISACA Issues Six Principles for Effective Cloud Computing

AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organisations, apparently from Chinese attackers.

According to the Unified Security Information and Event Management (SIEM) solutions specialist, the attacks signal a serious escalation into cyberspace of the cold war that has existed between the two countries since the Chinese army marched into majority Tibetan territory back in 1950.

Jaime Blasco, head of labs with AlienVault, said "Our research suggests that the attacks we have been tracking over the last few months are linked to the Kalachakra Initiation, a Tibetan religious festival that took place in early January," he said.

Read more: AlienVault research shows China escalating Tibetan cold war firmly into cyberspace

27% of Sample Reporting Security Budgets Have Increased In Response Proposed Changes, Yet Only 11% Automate Compliance Audits

Ramat Gan, Israel – Tufin Technologies, the market-leading provider of Security Policy Management solutions, today announced the results of a survey assessing how the recently announced updates to EU Data Protection legislation will impact IT compliance efforts. 42% of the 100 network security managers sampled by the firewall management software provider said the proposed changes led to increased risk awareness within their organization; 34% stated that their attitude towards Continuous Compliance had changed as a result, and 54% believe that automating audits would reduce the organization’s risk of violating the law.

Read more: Tufin Survey On The Proposed Changes To Eu Data Protection Laws Highlights The Need To Automate...