Featured

Security

Websense Announces New Heartbleed Detection for ACE Insight

Posted on 18 April 2014















SAN DIEGO, April 18, 2014 /PRNewswire/ – Today, Websense, Inc. announced that its CSI: ACE Insight analysis tool has been enhanced with additional analytics to help identify Heartbleed-vulnerable websites. As a free online service, any user can log onto www.aceinsight.com and direct CSI: ACE Insight to inspect a website for key indicators of the Heartbleed vulnerability. This system is backed by more than 10,000 analytics to detect additional security risks.

With proactive awareness, users can avoid revealing potentially sensitive information to cybercriminals by waiting to connect to such sites until after they been able to eliminate their exposure to a Heartbleed attack. In a scan of the top 50,000 Alexa sites, Websense found more than 800 of them were vulnerable to the Heartbleed bug.

“While Heartbleed has been in the news for over a week, we are still finding a large number of sites that are exploitable via the Heartbleed Open SSL vulnerability,” said Charles Renert, vice president of research at Websense. “If people or businesses are using websites that traffic in sensitive information like tax returns, bank accounts, brokerage accounts or anything else they would consider confidential, we highly recommend running that website through our CSI: ACE Insight tool first.”

Awareness of the Heartbleed vulnerability comes only weeks after Websense® Security Labs™ reported that 85 percent of all online malicious content in 2013 was found hidden on legitimate websites, making this CSI: ACE Insight announcement additionally comforting for those looking for a safer Internet experience.

For more information on CSI: ACEInsight.com and for immediate website safety analytics, please visit www.aceinsight.com.

About Websense, Inc.

Websense, Inc. is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. More than 11,000 enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.

Websense TRITON stops more threats; visit www.websense.com/proveit to see proof. To access the latest Websense security insights and connect through social media, please visit www.websense.com/smc. For more information, visit www.websense.com and www.websense.com/triton.

Websense Media Contact:
Patricia Hogan
Websense, Inc.
(858) 320-9393
[email protected]

SOURCE Websense

RELATED LINKS
http://www.websense.com

Source Article from http://www.prnewswire.com/news-releases/websense-announces-new-heartbleed-detection-for-ace-insight-255761201.html

Comments (0)

Networks

Electronics Recycling – Companies Are Getting Paid For Every Part Recycled With New Revenue Sharing Program

Posted on 18 April 2014
















KENNESAW, Ga., April 18, 2014 /PRNewswire/ – In an effort to increase awareness and environmental responsibility, eClaim Recovery Specialists is looking to work with businesses, located throughout North America that generate large volumes of ewaste, electronics, computers and networking equipment, to offer a new revenue sharing program that will allow customers to recycle and see a revenue from, not just the whole unit, but the parts and materials too.

http://youtu.be/QOIUjj1Na90

The new revenue sharing program was created to allow the businesses that currently recycle or sell their large volume obsolete, unwanted, scrap stocks for pennies on the dollar, to maximize their returns by receiving a percentage of the revenue generated after the products are dismantled and processed. Therefore, customers are not just getting paid for the whole unit, they are receiving a share in the return from the plastic, metal, gold, copper and other materials found inside.

eClaim Recovery Specialists offers a wide variety of free electronics recycling services, including computer recycling, mobile phone recycling, battery recycling, and more, to companies throughout the U.S. Wholesalers, distributors, retailers, and other businesses from across the country have trusted us to recycle their unwanted goods for years because our services are not only free, but exceptionally convenient as well.

eClaim has a ZERO landfill tolerance and enhances our customer’s sustainability and green initiatives with our 100% green compliant, closed loop eCycling, asset recovery and demanufacturing services.

Companies can now reduce the cost associated with recycling while maximizing the commodity values of your end-of-life materials. For more info, please visit eclaimrecovery.com.

Contact:
eClaim Recovery Specialists, LLC
678-401-2657
[email protected]

Photos:
http://www.prlog.org/12311506

SOURCE eClaim Recovery Specialists

Source Article from http://www.prnewswire.com/news-releases/electronics-recycling—companies-are-getting-paid-for-every-part-recycled-with-new-revenue-sharing-program-255760971.html

Comments (0)

Computer Software

ChinaEdu Corporation Announces Shareholders’ Approval Of Merger Agreement

Posted on 18 April 2014



















BEIJING, April 18, 2014 /PRNewswire/ — ChinaEdu Corporation (NASDAQ: CEDU) (the “Company”), a leading online educational services provider in China, today announced that, at an extraordinary general meeting held today, the Company’s shareholders voted in favor of the proposal to approve the previously announced Agreement and Plan of Merger dated December 31, 2013 (the “Merger Agreement”), by and among the Company, ChinaEdu Holdings Limited (“Holdings”) and ChinaEdu Merger Sub Limited (“Merger Sub”), pursuant to which Merger Sub will be merged with and into the Company with the Company surviving the merger as a wholly owned subsidiary of Holdings (the “Merger”). Of the Company’s ordinary shares entitled to vote at the extraordinary general meeting, approximately 81.1% of such shares were voted in person or by proxy at today’s meeting. The proposal to approve the Merger Agreement and the transactions contemplated thereby, including the Merger, received approval from (i) approximately 99.3% of the ordinary shares present and voting in person or by proxy as a single class at the extraordinary general meeting, and (ii) approximately 98.0% of the ordinary shares held by shareholders (excluding the shareholders who are members of the buyer consortium that will indirectly own 100% of the Company if the Merger is completed) present and voting in person or by proxy as a single class at the extraordinary general meeting.

The parties expect to complete the Merger as soon as practicable, subject to the satisfaction or waiver of the conditions set forth in the Merger Agreement. If and when completed, the Merger would result in the Company becoming a privately held company and its American depositary shares, each representing three ordinary shares of the Company (“ADSs”), will no longer be listed on the NASDAQ Global Market and the American depositary shares program for the ADSs will terminate.

About ChinaEdu Corporation

ChinaEdu Corporation is an educational services provider in China, incorporated as an exempted limited liability company in the Cayman Islands. Established in 1999, the Company’s primary business is to provide comprehensive services to the online degree programs of leading Chinese universities. These services include academic program development, technology services, enrollment marketing, student support services and finance operations. The Company’s other lines of businesses include the operation of private primary and secondary schools, online interactive tutoring services and providing marketing, support for international and elite curriculum programs and online learning community for adult students.

The Company believes it is the largest service provider to online degree programs in China in terms of the number of higher education institutions that are served and the number of student enrollments supported. The Company currently has entered into collaborative alliances with 13 universities, ranging from 15 to 50 years in length. The Company has also entered into technology agreements with 8 universities. Besides, ChinaEdu performs recruiting services for 23 universities through a nationwide learning center network.

Safe Harbor: Forward-Looking Statements

Certain statements contained in this announcement may be viewed as “forward-looking statements” within the meaning of Section 27A of the U.S. Securities Act of 1933, as amended, and Section 21E of the U.S. Securities Exchange Act of 1934, as amended, and as defined in the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as “if,” “will,” “expected,” and similar statements. Forward-looking statements involve inherent risks, uncertainties and assumptions. Risks, uncertainties and assumptions include: the possibility that competing offers will be made; the possibility that debt financing may not be available; the possibility that various closing conditions for the transaction may not be satisfied or waived; and other risks and uncertainties discussed in documents filed with the SEC by the Company, as well as the Schedule 13E-3 transaction statement and the proxy statement to be filed by the Company. These forward-looking statements reflect the Company’s expectations as of the date of this press release. You should not rely upon these forward-looking statements as predictions of future events. The Company undertakes no ongoing obligation, other than that imposed by law, to update these statements.

For further information, please contact:

Helen Plummer
Senior Investor Relations Coordinator
ChinaEdu Corporation
Phone: +1 908-442-9395
E-mail: [email protected]

Simon Mei
Chief Financial Officer
ChinaEdu Corporation
Phone: +86 10 8418-7301
E-mail: [email protected]

SOURCE ChinaEdu Corporation

RELATED LINKS
http://ir.chinaedu.net/index.html

Source Article from http://www.prnewswire.com/news-releases/chinaedu-corporation-announces-shareholders-approval-of-merger-agreement-255757381.html

Comments (0)

Computer Software

ChinaEdu Corporation Announces Shareholders’ Approval Of Merger Agreement

Posted on 18 April 2014



















BEIJING, April 18, 2014 /PRNewswire/ — ChinaEdu Corporation (NASDAQ: CEDU) (the “Company”), a leading online educational services provider in China, today announced that, at an extraordinary general meeting held today, the Company’s shareholders voted in favor of the proposal to approve the previously announced Agreement and Plan of Merger dated December 31, 2013 (the “Merger Agreement”), by and among the Company, ChinaEdu Holdings Limited (“Holdings”) and ChinaEdu Merger Sub Limited (“Merger Sub”), pursuant to which Merger Sub will be merged with and into the Company with the Company surviving the merger as a wholly owned subsidiary of Holdings (the “Merger”). Of the Company’s ordinary shares entitled to vote at the extraordinary general meeting, approximately 81.1% of such shares were voted in person or by proxy at today’s meeting. The proposal to approve the Merger Agreement and the transactions contemplated thereby, including the Merger, received approval from (i) approximately 99.3% of the ordinary shares present and voting in person or by proxy as a single class at the extraordinary general meeting, and (ii) approximately 98.0% of the ordinary shares held by shareholders (excluding the shareholders who are members of the buyer consortium that will indirectly own 100% of the Company if the Merger is completed) present and voting in person or by proxy as a single class at the extraordinary general meeting.

The parties expect to complete the Merger as soon as practicable, subject to the satisfaction or waiver of the conditions set forth in the Merger Agreement. If and when completed, the Merger would result in the Company becoming a privately held company and its American depositary shares, each representing three ordinary shares of the Company (“ADSs”), will no longer be listed on the NASDAQ Global Market and the American depositary shares program for the ADSs will terminate.

About ChinaEdu Corporation

ChinaEdu Corporation is an educational services provider in China, incorporated as an exempted limited liability company in the Cayman Islands. Established in 1999, the Company’s primary business is to provide comprehensive services to the online degree programs of leading Chinese universities. These services include academic program development, technology services, enrollment marketing, student support services and finance operations. The Company’s other lines of businesses include the operation of private primary and secondary schools, online interactive tutoring services and providing marketing, support for international and elite curriculum programs and online learning community for adult students.

The Company believes it is the largest service provider to online degree programs in China in terms of the number of higher education institutions that are served and the number of student enrollments supported. The Company currently has entered into collaborative alliances with 13 universities, ranging from 15 to 50 years in length. The Company has also entered into technology agreements with 8 universities. Besides, ChinaEdu performs recruiting services for 23 universities through a nationwide learning center network.

Safe Harbor: Forward-Looking Statements

Certain statements contained in this announcement may be viewed as “forward-looking statements” within the meaning of Section 27A of the U.S. Securities Act of 1933, as amended, and Section 21E of the U.S. Securities Exchange Act of 1934, as amended, and as defined in the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as “if,” “will,” “expected,” and similar statements. Forward-looking statements involve inherent risks, uncertainties and assumptions. Risks, uncertainties and assumptions include: the possibility that competing offers will be made; the possibility that debt financing may not be available; the possibility that various closing conditions for the transaction may not be satisfied or waived; and other risks and uncertainties discussed in documents filed with the SEC by the Company, as well as the Schedule 13E-3 transaction statement and the proxy statement to be filed by the Company. These forward-looking statements reflect the Company’s expectations as of the date of this press release. You should not rely upon these forward-looking statements as predictions of future events. The Company undertakes no ongoing obligation, other than that imposed by law, to update these statements.

For further information, please contact:

Helen Plummer
Senior Investor Relations Coordinator
ChinaEdu Corporation
Phone: +1 908-442-9395
E-mail: [email protected]

Simon Mei
Chief Financial Officer
ChinaEdu Corporation
Phone: +86 10 8418-7301
E-mail: [email protected]

SOURCE ChinaEdu Corporation

RELATED LINKS
http://ir.chinaedu.net/index.html

Source Article from http://www.prnewswire.com/news-releases/chinaedu-corporation-announces-shareholders-approval-of-merger-agreement-255757381.html

Comments (0)

Computer Software

NARTech Appraised at CMMI Level 5 – Achieving the Highest Process Maturity Level Demonstrating an Organization Optimized for Productivity and Quality

Posted on 18 April 2014













BETHESDA, Md., April 18, 2014 /PRNewswire/ – NARTech today announced that it has been appraised at the CMMI Institute’s Capability Maturity Model Integration (CMMI) Level 5.   This CMMI Level 5 appraisal places NARTech among the Top 5.6% of companies in the US and among the Top 7.4% CMMI appraised companies in the world, according to the CMMI Institute’s Published Appraisal Results.

CMMI is a process improvement approach for software engineering projects that provides organizations with the essential elements of effective processes that improve their performance, productivity, and results in high quality, consistent and efficient service delivery.

An appraisal at CMMI Level 5 indicates that NARTech as an organization is performing at an “Optimizing” level, in which the organization is continually improving process performance through both incremental and innovative technological improvements.  Processes are continually improved based on a quantitative understanding of variation.  Quantitative process-improvement objectives for the organization are established, continually revised to reflect changing business objectives, and used as criteria in managing projects, predicting results, and process improvement. It demonstrates how well NARTech does in terms of productivity, quality, and risk management on its software engineering federal government contracts in comparison to others in this industry through the implementation of 435 practices in 21 process areas.  NARTech has a record of delivering on-time/on-budget with 100% client satisfaction over the last 6-year period on all of its prime contracts. The CMMI Level 5 appraisal further solidifies NARTech’s capability to deliver with Discipline, Consistency, Effectiveness, and Efficiency every time and all the time for its federal clients.

NARTech was commended for the following strengths in its CMMI High Maturity Appraisals:  (1) Continued maturity of the organization to meet and exceed the business objectives and performance goals; (2) Corporate Commitment and the Project Team living continuous improvement; (3) Level of staff expertise; (4) High customer satisfaction ratings; (5) Exceptional risk management; (6) Innovative use of Microsoft SharePoint to support Agile development environment, collaboration, and CMMI practices; (7) Use of latest virtual and mobile workforce tools to enhance instant communication and sharing of information; (8) Well established baselines and predictive models; (9) Excellent set of standard processes; and (10) Teamwork with focus on attention to detail.

NARTech, Inc., a Certified Woman / Minority Owned Small Business & 8(a) Graduate, specializes in providing IT application systems development, maintenance and integration services to federal government clients.  More information on NARTech is available at www.nartechinc.com.

SOURCE NARTech, Inc.

RELATED LINKS
http://www.nartechinc.com

Source Article from http://www.prnewswire.com/news-releases/nartech-appraised-at-cmmi-level-5—achieving-the-highest-process-maturity-level-demonstrating-an-organization-optimized-for-productivity-and-quality-255757341.html

Comments (0)

Cloud Computing

Parallels and Red Hat Containers could take cloud to new heights

Posted on 18 April 2014

V3's Dan RobinsonThis week has seen a number of announcements relating to cloud computing from leading vendors in the field such as Red Hat, Canonical and the OpenStack project. And one subject that kept cropping up each time was Containers.

Containers have been around for some time, but seem to be garnering a lot more attention lately. The basic concept is to partition off some of a server’s resources in order to create an isolated instance, somewhat akin to a virtual machine.

Unlike virtualisation, a number of Containers rely on the same host operating system for services. Containers can be thought of as separate instances of whichever operating system is installed on the host server.

This Containers approach has the advantage that it is less demanding of system resources, and therefore allows for a higher density of instances than is possible with virtual machines. In the cloud and in many corporate data centres, density has become a major issue, as firms struggle with rising energy costs and the need to cram more and more capacity into the same space.

For this reason, Parallels has been offering its Virtuozzo Containers platform for many years, allowing hosting firms to carve up Windows or Linux servers into many more instances that can be made available to customers than would be possible with the hypervisor approach.

However, the downside of Containers is that they are not as flexible as virtual machines. With the LXC technology in the Linux kernel, for example, you are obviously restricted to running Linux applications inside a Container.

For this reason, Containers are unlikely to replace virtual machines, but they are already being offered alongside them by some cloud providers, notably ElasticHosts, which launched its Elastic Containers service earlier this month.

Some Linux developers such as Red Hat and the Docker project are working with the Containers technology to enable greater portability of applications between clouds. Because a Container may have little more than the application inside it, it is potentially much more feasible to migrate from an on-premise private cloud out to a public cloud and back again than is the case with virtual machine images.

Meanwhile, some workloads, such as Hadoop, are best delivered by provisioning the necessary resources onto bare metal. For this reason, the latest Icehouse release of the OpenStack cloud platform showcases a module called Ironic to support this. Ironic is still in “incubation” in this release, but will be polished over time as development proceeds.

All these threads seem to indicate that the successful cloud platforms of the future will be more diverse than at present, able to support a variety of technologies best suited for differing workloads and use cases.

And that brings to mind a conversation I once had with one of the founders of Parallels, who said that virtualisation was basically a dead end. It only exists, he said, because we haven’t yet figured out how to create applications that can scale elegantly to make use of a large number of processors. Perhaps when we figure that out, cloud computing really will take off.

Source Article from http://www.v3.co.uk/v3-uk/news/2340687/parallels-and-red-hat-containers-could-take-cloud-to-new-heights

Comments (0)

Security

Global BYOD Security Market 2014-2018

Posted on 17 April 2014















DUBLIN, Ireland, April 17, 2014 /PRNewswire/ –

Research and Markets (http://www.researchandmarkets.com/research/68g4h9/global_byod) has announced the addition of the “Global BYOD Security Market 2014-2018″ report to their offering. 
     (Logo: http://photos.prnewswire.com/prnh/20130307/600769 )

The analysts forecast the Global BYOD Security market to grow at a CAGR of 31.95 percent over the period 2013-2018. One of the key factors contributing to this market growth is the need for enhanced mobile communication security. The Global BYOD Security market has also been witnessing the increasing need for enterprise mobility. However, the difficulty in tracking deployed assets could pose a challenge to the growth of this market. 

The report, the Global BYOD Security Market 2014-2018, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the Americas, and the EMEA and APAC regions; it also covers the Global BYOD Security market landscape and its growth prospects in the coming years. The report also includes a discussion of the key vendors operating in this market.

The growing globalization of organizations has led to an increased need for enterprise mobility. Enterprise mobility helps organizations exchange data and information without any time and location constraints. Hence, organizations have been increasingly adopting BYOD policies to implement enterprise mobility. With the implementation of a BYOD policy, employees can use their personal devices to handle their organization’s data. This increases the need for BYOD security solutions as such solutions provide data security and enable better handling of data.

According to the report, one of the major drivers in this market is the need for enhanced mobile communication security. MDM enterprise software allows organizations to effectively optimize their security and functionality, thereby reducing the risk of data loss. Therefore, the effective implementation of BYOD security solutions helps protect and control data and configuration across mobile devices in an organizational network.

Further, the report states that one of the major challenges in this market is the difficulty in tracking deployed assets. After the deployment of mobile devices in organizations, tracking them is difficult even with the implementation of BYOD security solutions. Therefore, protecting all the deployed assets becomes difficult. This reduces the efficacy a BYOD security setup, discouraging enterprises from adopting BYOD security solutions.

The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to a SWOT analysis of the key vendors. 

Key Topics Covered: 

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

04. Market Research Methodology

05. Introduction

06. Market Landscape

07. Market Segmentation

08. Geographical Segmentation

09. Buying Criteria

10. Market Growth Drivers

11. Drivers and their Impact

12. Market Challenges

13. Impact of Drivers and Challenges

14. Market Trends

15. Trends and their Impact

16. Vendor Landscape

17. Key Vendor Analysis

18. Other Reports in this Series


Companies Mentioned:

  • AirWatch LLC
  • Citrix Systems Inc.
  • Good Technology Inc.
  • Fiberlink Communication Corp.
  • Mobilelron Inc.
  • IBM Corp.
  • McAfee Inc.
  • SAP AG
  • Symantec Corp.

For more information visit http://www.researchandmarkets.com/research/68g4h9/global_byod

Media Contact: Laura Wood , +353-1-481-1716, [email protected]

SOURCE Research and Markets

Source Article from http://www.prnewswire.com/news-releases/global-byod-security-market-2014-2018-255708351.html

Comments (0)

Computer Software

Global Application Server Market 2014-2018

Posted on 17 April 2014















DUBLIN, Ireland, April 17, 2014 /PRNewswire/ –

Research and Markets (http://www.researchandmarkets.com/research/68crk4/global) has announced the addition of the “Global Application Server Market 2014-2018″ report to their offering. 
     (Logo: http://photos.prnewswire.com/prnh/20130307/600769 )

The analysts forecast the Global Application Server market to grow at a CAGR of 21.95 percent over the period 2013-2018. One of the key factors contributing to this market growth is the growing adoption of the internet of things. The Global Application Server market has also been witnessing the increasing demand for mobile internet services. However, the increasing demand for customized applications could pose a challenge to the growth of this market. 

The report, the Global Application Server market 2014-2018, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the Americas, and the EMEA and APAC regions; it also covers the Global Application Server market landscape and its growth prospects in the coming years. The report also includes a discussion of the key vendors operating in this market.

Smartphones, tablets, and other handheld devices are witnessing increased adoption by the enterprises and end-users. Many enterprises are adopting the BYOD policy as a part of their business, which is increasing the number of applications being developed to meet the specific computing requirements of the enterprises and end-users. 

All the applications deployed on the end-user devices are programmed using programming models which require supporting files for execution that are loaded on the application server. Application servers manage resource allocation, execution, resource sharing, storage allocation, storage space management, and virtualization of the platform, which provide execution support to the applications on the devices.

According to the report, one of the major drivers in the market is the increased adoption of the internet of things among enterprises and end-users. The increased adoption of smartphones, tablets, and other handheld devices is leading to the integration of applications and cross connectivity. Applications are developed to integrate the data and applications being used over the handheld devices into a central repository. There are many applications that aim at implementing a centralized access system.

Further, the report states that one of the major challenges is the increasing demand for customized applications from end-users. As a result of the increased digital content and the increased complexity of enterprise business, enterprises need customized applications and services.

The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to a SWOT analysis of the key vendors. 

Key Topics Covered: 

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

04. Market Research Methodology

05. Introduction

06. Market Landscape

07. Geographical Segmentation

08. Key Leading Countries

09. Buying Criteria

10. Market Growth Drivers

11. Drivers and their Impact

12. Market Challenges

13. Impact of Drivers and Challenges

14. Market Trends

15. Trends and their Impact

16. Vendor Landscape

17. Key Vendor Analysis

18. Other Reports in this Series 


Companies Mentioned:

  • Adobe Systems Inc.
  • Apache Corp.
  • Cisco Systems Inc.
  • EMC Corp.
  • Fiorano Software Inc.
  • Fujitsu Ltd.
  • Hewlett Packard Co.
  • IBM Corp.
  • Microsoft Corp.
  • NEC Corp.
  • Oracle Corp.
  • PolarLake
  • RedHat Inc.
  • SAP AG
  • Tibco Software Inc.
  • VMware Inc.

For more information visit http://www.researchandmarkets.com/research/68crk4/global

Media Contact: Laura Wood , +353-1-481-1716, [email protected]

SOURCE Research and Markets

Source Article from http://www.prnewswire.com/news-releases/global-application-server-market-2014-2018-255708141.html

Comments (0)

Computer Hardware

Cyber Security Consulting and Solutions Firm iSECURE Hosts IBM’s X-Force Security Executive Summit

Posted on 17 April 2014
















ROCHESTER, N.Y., April 17, 2014 /PRNewswire/ – iSECURE, LLC, an end-to-end cyber security consulting and solutions provider, today announced program details of its forthcoming “2014 Information Security Executive Summit,” to be held in partnership with the IBM X-Force Research and Development organization and a former Under Secretary of Homeland Security.

The Summit will take place on Thursday, April 24th, 2014, from 9:00 a.m. to 2:00 p.m. at the Trumbull Marriott Hotel, 180 Hawley Lane, Trumbull, Connecticut. It will provide IT professionals with the latest thinking from some of IBM’s top security experts on ways to protect against the most urgent cyber threats facing organizations today, including Heartbleed. The Summit is free of charge and offers three CPE credit hours.

The summit will include:

  • Keynote Speaker, Asa Hutchinson, Former Under Secretary of Homeland Security, who will offer an insider’s look what the government knows about the war on cyber crime today.
  • Chris Poulin, Research Strategist for IBM’s X-Force Research & Development Team, who will present, “Anatomy of the Target Breach: Lessons Learned and How to Protect Against Similar Advanced Threats.” He’ll discuss the details of this breach, how the attackers persisted undetected two weeks before it was discovered, and what IT professionals can do to protect their organization against similar attacks.
  • Diana Kelly, Application Security Strategist for IBM Security Systems, who will review the “2014 X-Force Report.” She will discuss the most recent trends from the 1Q 2014 report, including watering hole attacks and malvertising. She’ll also provide advice on how organizations can leverage the data to improve their security posture.

About Asa Hutchinson

After being re-elected to his third term in Congress in November 2000, Asa was appointed Administrator of the Drug Enforcement Administration (DEA) in 2001. In January 2003, he was confirmed by U.S. Senate to be the first Under Secretary of the newly created Department of Homeland Security. Asa is a 2014 candidate for Governor of Arkansas.

About X-Force

IBM X-Force Research and Development is one of the most renowned commercial security research and development teams in the world. These security professionals monitor and analyze security issues from a variety of sources, including its database of more than 76,000 computer security vulnerabilities, its global web crawler and its international spam collectors. The X-Force team produces the IBM X-Force Threat Intelligence Quarterly report to help customers, fellow researchers and the public at large better understand the latest security risks, and stay ahead of emerging threats.

About iSECURE

iSECURE, LLC is an end-to-end cyber security consulting and solutions firm with more than 20 years experience providing last mile Internet and managed security services to organizations across all industries, protecting them against Internet-based threats to their technologies and businesses. Headquartered near Rochester, New York, with an office in Orange, Connecticut, iSECURE delivers a comprehensive set of security tools — comprising the full spectrum of consulting services, software and hardware — along with the industry-leading capabilities of its seasoned team of certified security engineers.

To register, interested IT professionals should direct all inquiries to Donna Smith, Director of Marketing at 585.419.8211 or email: [email protected].

SOURCE iSECURE, LLC

RELATED LINKS
http://www.isecurenet.net

Source Article from http://www.prnewswire.com/news-releases/cyber-security-consulting-and-solutions-firm-isecure-hosts-ibms-x-force-security-executive-summit-255707291.html

Comments (0)

Computer Hardware

Cyber Security Consulting and Solutions Firm iSECURE Hosts IBM’s X-Force Security Executive Summit

Posted on 17 April 2014
















ROCHESTER, N.Y., April 17, 2014 /PRNewswire/ – iSECURE, LLC, an end-to-end cyber security consulting and solutions provider, today announced program details of its forthcoming “2014 Information Security Executive Summit,” to be held in partnership with the IBM X-Force Research and Development organization and a former Under Secretary of Homeland Security.

The Summit will take place on Thursday, April 24th, 2014, from 9:00 a.m. to 2:00 p.m. at the Trumbull Marriott Hotel, 180 Hawley Lane, Trumbull, Connecticut. It will provide IT professionals with the latest thinking from some of IBM’s top security experts on ways to protect against the most urgent cyber threats facing organizations today, including Heartbleed. The Summit is free of charge and offers three CPE credit hours.

The summit will include:

  • Keynote Speaker, Asa Hutchinson, Former Under Secretary of Homeland Security, who will offer an insider’s look what the government knows about the war on cyber crime today.
  • Chris Poulin, Research Strategist for IBM’s X-Force Research & Development Team, who will present, “Anatomy of the Target Breach: Lessons Learned and How to Protect Against Similar Advanced Threats.” He’ll discuss the details of this breach, how the attackers persisted undetected two weeks before it was discovered, and what IT professionals can do to protect their organization against similar attacks.
  • Diana Kelly, Application Security Strategist for IBM Security Systems, who will review the “2014 X-Force Report.” She will discuss the most recent trends from the 1Q 2014 report, including watering hole attacks and malvertising. She’ll also provide advice on how organizations can leverage the data to improve their security posture.

About Asa Hutchinson

After being re-elected to his third term in Congress in November 2000, Asa was appointed Administrator of the Drug Enforcement Administration (DEA) in 2001. In January 2003, he was confirmed by U.S. Senate to be the first Under Secretary of the newly created Department of Homeland Security. Asa is a 2014 candidate for Governor of Arkansas.

About X-Force

IBM X-Force Research and Development is one of the most renowned commercial security research and development teams in the world. These security professionals monitor and analyze security issues from a variety of sources, including its database of more than 76,000 computer security vulnerabilities, its global web crawler and its international spam collectors. The X-Force team produces the IBM X-Force Threat Intelligence Quarterly report to help customers, fellow researchers and the public at large better understand the latest security risks, and stay ahead of emerging threats.

About iSECURE

iSECURE, LLC is an end-to-end cyber security consulting and solutions firm with more than 20 years experience providing last mile Internet and managed security services to organizations across all industries, protecting them against Internet-based threats to their technologies and businesses. Headquartered near Rochester, New York, with an office in Orange, Connecticut, iSECURE delivers a comprehensive set of security tools — comprising the full spectrum of consulting services, software and hardware — along with the industry-leading capabilities of its seasoned team of certified security engineers.

To register, interested IT professionals should direct all inquiries to Donna Smith, Director of Marketing at 585.419.8211 or email: [email protected].

SOURCE iSECURE, LLC

RELATED LINKS
http://www.isecurenet.net

Source Article from http://www.prnewswire.com/news-releases/cyber-security-consulting-and-solutions-firm-isecure-hosts-ibms-x-force-security-executive-summit-255707291.html

Comments (0)

SEE MORE ARTICLES IN THE ARCHIVE

Advertise Here
Advertise Here