New Guide Helps Enterprises Perform Business-relevant Assessments   Rolling Meadows, IL, USA (30 May 2013) — Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is that assurance processes consume resources, slow activities and can lead to additional work—all to achieve goals they may not understand.  ISACA’s new COBIT 5 for Assurance bridges the gap by translating assurance activities into a common language that is meaningful to business and technology partners and ties assessment goals directly to business goals. Building on the globally recognized COBIT 5 framework, COBIT 5 for Assurance provides practical guidance for unifying business, IT and assurance professionals around a shared approach when planning and performing assurance reviews.  

Read more: ISACA Issues COBIT 5 for Assurance

 LONDON (UK), 30 May 2013 – Security experts at Voltage Security, the world leader in data-centric security, warn that a drop in enterprises that prohibit BYOD, coupled with a new mobile enterprise era rung in by the introduction of 4G, could leave organisations across the UK wide open to cybercriminals unless they take on appropriate security measures.

 

Voltage predicts that with BYOD more attractive than ever, it’s critical more than ever before for enterprises to think beyond just protecting the device. The attackers want the data – and so that’s where the protection needs to be. With faster networks and more “anytime, anywhere” business, more sensitive data will be shared across mobile channels - within the enterprise and to customers. Smartphones and fast networks integrate the consumer into the business through data.

Read more: Surge in mobile cyber-crime predicted with UK Rollout of 4G

 Trusteer Mobile Risk Engine Stops Account Takeover from Mobile Devices and Blocks Mobile Malware and Hybrid PC/Mobile Attacks  

LONDON (UK), May 29, 2013 –Trusteer, the leading provider of endpoint cybercrime prevention, today announced the Trusteer Mobile Risk Engine to protect financial institutions against mobile and PC-to-mobile (cross-channel) attacks. Trusteer Mobile Risk Engine detects and stops account takeover from mobile devices by conclusively identifying criminal access attempts.  It also identifies devices that are vulnerable to compromise by malware and those that have been infected. Mobile malware is commonly used to bypass strong authentication methods such as SMS One-Time Passwords (SMS OTP).

Read more: Trusteer Provides Holistic Protection for Mobile and Online Banking Channels

 Ulam brings over 22 years of legal expertise, including roles with several security companies, as well as experience with the FBI   london (uk), May 29, 2013 – Lancope, Inc., a leader in network visibility and security intelligence, has announced the appointment of Jim Ulam as general counsel and corporate secretary. Ulam has over 22 years of legal expertise, including general counsel roles with VeriSign and SecureWorks, as well as experience working with the FBI. As Lancope continues to expand globally, Ulam’s in-depth insight will be instrumental for overseeing a rapidly increasing number of commercial agreements and overall corporate expansion.   “Lancope is growing exponentially as more companies around the world recognise the unique value of flow-based monitoring for keeping their networks guarded against advanced attacks,” said Mike Potts, president and CEO of Lancope.

Read more: Lancope Appoints Jim Ulam as General Counsel and Corporate Secretary

 “The reality is that mid-sized businesses need to help themselves in the security defence stakes, as no-one - including the government - is going to run to their rescue in the event they are hit by a cyber crime.” – Richard Kirk, AlienVault Senior Vice President   Commenting on the latest cyber security report from the Federation of Small Businesses (FSB)  - which found that SMBs are shouldering an enormous financial burden due to online and related fraud - AlienVault says that it is SMBs, and even midsize businesses, that have the most difficult task when it comes defending themselves from cybercriminals who are intent on theft and reputation damage.  

Read more: AlienVault says SMBs--and mid-market organisations--need to help themselves on cyberfraud