5.11.15

ESET part of Deloitte's ranking for 13th time, this year again as ‘Big 5‘


Deloitte recognizes 223% growth of ESET in Central Europe

ESET®, a global pioneer in proactive protection for more than two decades, has been included once again in ‘Big 5’ ranking of Deloitte’s Annual Technology Fast 50 CE report. ESET has enjoyed a 223% growth in Central Europe and is part of the ‘Big 5’ as the only company founded prior to 2000. It corroborates the  confirmed growth by  Gartner. ESET has been present in Deloitte’s top rankings for Central Europe for 13-times already.

ESET is very proud of its fast-paced growth over the past 25 years,” said Ignacio Sbampato, Chief Sales and Marketing Officer at ESET, reminding that ESET technology has celebrated its 25th anniversary in 2012. “It’s thanks to our employees, business partners, and, most importantly, our customers, that ESET has been ranked in Deloitte’s Big 5 once again. In return, we promise to do our very best to earn this recognition again next year.”

Deloitte’s Big 5 award recognizes technology companies that are too big to compete in growth terms with smaller firms. In order to be eligible for the Big 5, a company must be trading for a minimum of four years, has to record revenue in excess of 25 million euros, and be headquartered in Central Europe.  ESET has previously and for several years running been ranked in the Fast 50 CE as well.

Central and Eastern Europe has traditionally been strong for ESET. However even as ESET is a company from Slovakia, we are as well the biggest IT security company from the European Union. We will keep our focus to stay strong within this particular region and strengthen our business in the whole of Europe,” says Miroslav Mikus, ESET’s Sales and Marketing Director for Europe, Middle East and Africa.


Learn more about ESET and ESET‘s products by visiting www.eset.com

4.11.15

Software AG’s Digital Business Platform Wins Gold



At the ceremony of the Readers' Choice Awards 2015, the Digital Business Platform Software AG won gold in the category "Big Data Middleware". The prize was awarded for the first time this year by Vogel Business Media's "Big Data Insider" IT portal*. The portal’s readers had six months to vote on different vendors' offerings in seven categories. Nearly 30,000 readers participated.

Software AG and nine other vendors were nominated for the Middleware category with Software AG capturing the gold medal for its offering. The editorial selection included companies that had recently made a name for themselves through cutting-edge technologies, outstanding products or concepts and innovative strategies.

Dr. Wolfram Jost, Software AG's CTO, board member and inventor of the Digital Business Platform, stated, "We are extremely pleased with our gold medal. We launched our middleware offering last year under the name Digital Business Platform to give organizations transitioning to digital enterprises exactly what they need: flexible and agile software that meets the requirements of the digital world's lightning speed. Our award confirms that we are right on track."

Software AG unveiled its Digital Business Platform a year ago at Innovation World, the company's annual global customer conference. It is the world's first platform of its kind, enabling companies to digitize their business models.  The platform consists of five components to be used separately or combined as a package, including business and IT transformation, in-memory data storage, integration, process optimization and data analysis.


Please click here for more information: Digital Business Platform

3.11.15

Cybersecurity research boost for medical devices


By Narinder Purba posted 3 Nov 2015 - 12:12PM

The National Science Foundation in the US has awarded TCU (Texas Christian University) approximately $250,000 in funding to help it come up with effective measures that will protect medical devices from cyberattacks.
Ensuring that networked equipment remains secure is an increasingly pressing issue, as while the use of technology in healthcare is an obvious benefit, full consideration of the security implications of new tech has been slow.
It is this fact that Michael Bachmann, associate professor of criminal justice at TCU, is seeking to address with his study – cybercriminals are extremely likely to increase their activity in this area meaning the threat is very real.
“Not only can you access all these devices and wreak havoc within a hospital when you’re there, but you don’t even need to be there.”
Speaking to WFAA-8, the expert said that he is of the opinion that the vulnerabilities associated with networked medical devices, including radiation machines and pacemakers, need to be urgently addressed.
He described the cybersecurity situation in this area as “dire”, adding: “Not only can you access all these devices and wreak havoc within a hospital when you’re there, but you don’t even need to be there.”
A high-profile example of the concern some people have regarding the exploitation of connected devices came in 2013, when former US vice president Dick Cheney revealed that he had deactivated the wireless feature in his implanted heart defibrillator.
“Implantable cardioverter defibrillators can be vulnerable to a range of electronic signals,” Adrian Culley, an information security professional, was quoted by the BBC as saying at the time.
“Research has been undertaken which shows it is entirely feasible to potentially exploit someone’s ICD, given close proximity to the individual.”
Data protection is another concern
 Other concerns that security professionals have with healthcare is focused on data protection.
This was discussed in detail on We Live Security recently, with ESET security researcher Lysa Myers noting earlier this year that recent breaches at Premera and Anthem have highlighted obvious flaws within organizations operating in the healthcare industry.
“Medical records are likely to remain a tempting target as long as there is a sufficient return on criminals’ investment of time and effort,” she said.

“It is important for healthcare practitioners and businesses to take extra care of their patients’ data, as well as their health.”

Ransomware: To pay or not to pay?



By Peter Stancik posted 30 Oct 2015 

The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?
Joseph Bonavolonta, an assistant special agent with the FBI, speaking at the Cyber Security Summit 2015 in Boston, surprised the audience during his presentation: “To be honest, we often advise people just to pay the ransom, because the ransomware is that good.”
“What’s wrong, however, is to consider paying the ransom as an alternative to prevention.”
The FBI’s recommendation seems to be in stark contrast with the position of the IT security industry, which believes that “paying the ransom should not be an option”.
Don’t get me wrong, we do not claim that there is no chance that paying the ransom would indeed buy victim the decryption keys and prevent huge damage from losing their data.
What’s wrong, however, is to consider paying the ransom as an alternative to prevention. Dealing with extortionists is different to dealing with, for instance, traffic police. You might think you can save time by speeding and consider the risk of paying a fine as a better option to being late to a job interview. It can seem reasonable and legitimate to you (don’t tell this to the cops).
In such a case you can be sure that paying the fine solves your problem. But when paying the ransom, you can quite easily end up empty-handed, with your bitcoins gone and your files still encrypted.
Another reason for favoring prevention over paying the ransom is that in most cases the former requires no significant effort. Prevention in this case means that internet users adhere to basic principles of safe behavior (including having their systems fully patched, installed and updated) and that a data backup and recovery solution is implemented and fully functional.
Doing that does not only help to avoid falling victim to ransomware attacks, it also helps to keep other threats at bay (from viruses, through to employees going “mad”, to natural disasters).
“Europol considers ransomware the greatest threat ints latest issue of Internet Organised Crime Threat Assessment.”
Europol, the law enforcement agency of the European Union, considers ransomware the greatest threat in its latest issue of Internet Organised Crime Threat Assessment; the FBI said earlier this year that between April 2014 and June 2015 it had received nearly 1000 complaints related to CryptoWall, one of the most prolific forms of ransomware, with total reported losses around $18 million; and according to a panel discussion at Georgetown Law’s Cybercrime 2020: The Future of Online Crime and Investigations conference in December 2014, ransomware represents the future of consumer cybercrime.
Undoubtedly, ransomware is on the rise. But it still represents only a fraction of threats that systems and data of both organizations and consumers face. This is why the idea of “At worst, we’ll pay up the ransom” is so bad. Ransom should not be considered a price for a very special form of a security audit.
Remember: it’s not “mere 500 bucks” that is at stake. It’s your data that can be lost, and your customers that can lose their trust in you, and your compliance that can be questioned, and …
Do you really wish to see yourself totally dependent on ‘cybercriminals’ customer service’?
If not, stop considering the ransom an option and improve your IT security and resilience.