Welcome!

Related Topics: Cloud Security

News Feed Item

Citadel Responds to Latest Cyber Theft Events With New Security Service to Protect Computer Networks

Free Daily Service Identifies New Threats and Recommends Steps to Defend Networks Against Cyber Attacks

DALLAS, TX -- (MARKET WIRE) -- 06/20/05 -- In response to the recent series of major computer system breaches, Citadel Security Software Inc. (NASDAQ: CDSS), a leader in enterprise vulnerability management and policy enforcement solutions, has increased its efforts to educate public, private and academic organizations about network security best practices. Today Citadel introduced a daily security news service that provides up-to-the-minute threat alerts, recommended actions to thwart attacks, and headline news in a radio-style broadcast. This free subscription service enables network security professionals to stay abreast of new vulnerabilities and quickly develop plans to mitigate risk and maintain security compliance.

Because of the serious and ongoing nature of security breaches at some of the country's leading businesses, Citadel decided to offer its "Citadel 2 Minute Warning - A Daily Security Briefing" free to customers and non-customers alike. By doing so, Citadel aims to build awareness of the ever-widening range of exploitable vulnerabilities, promote the aggressive implementation of security measures, and minimize the damage caused by security exploits. In addition, Citadel customers can proactively remove any vulnerabilities before they are exploited using the company's award-winning Hercules automated vulnerability remediation solution.

"When I testified before a Congressional panel a year ago, I warned that the dangerous state of exploitable vulnerabilities in computer systems presented serious risks to the U.S. economy and even our way of life," said Steve Solomon, CEO of Citadel Security Software. "The technology sector is responding to this danger with tools that have proven to be successful in protecting networks from the constant onslaught of security threats. This country and its leaders must act with urgency to invest in security measures that will defend our nation's critical infrastructures."

While progress has been made in the government and private sectors, the recent string of significant breaches demonstrates there is more to be done -- and quickly -- to prevent attacks that may threaten economic stability and national security. The latest breach announced by MasterCard International at its credit card processing provider, CardSystems Solutions, Inc., underscores the importance of enforcing minimum security requirements for participating companies throughout the credit card industry supply chain. This step would "operationalize" information security as a routine business process and improve compliance with current statutory and regulatory requirements for security and privacy.

"Improving the cyber security profile of this nation must be a collaborative effort among public, private and academic sectors that are entrusted with personal information and other sensitive data," said Bob Dix, Citadel Vice President and former Staff Director of the House Government Reform Subcommittee on Technology during the 108th Congress. "Awareness through education is the first step in the development of a consistent and repeatable process for security compliance. We also need incentives that recognize the proactive efforts organizations are taking to protect networks against security threats and exploits."

"The recent highly publicized exploits, including the breach announced by MasterCard at its third-party credit card processing provider, is a manifestation of our nation's unprotected infrastructure resulting from the lack of investment in proactive technology to not only identify and respond to threats but to automate the removal of known vulnerabilities," said James C Foster, Deputy Director of Global Security Solutions for CSC and author of the best-selling book, "Buffer Overflow Attacks." "Companies need to implement technologies that not only create but enforce comprehensive security compliance policies to eliminate vulnerabilities from their networks before events like this occur."

About Citadel's 2 Minute Warning - A Daily Security Briefing

Citadel's 2 Minute Warning is an enhanced service offering that leverages Citadel's vast library of 23,000 remedies to known system vulnerabilities. These remedies, when applied in a timely manner, strengthen the security posture of an organization's network. Citadel's V-Flash Team of security analysts and remediation experts fuel the daily briefings with around-the-clock research to alert subscribers to their current threat exposure, identify new exploits, worms and viruses, and recommend specific security measures to prevent attacks.

Citadel's 2 Minute Warning is composed of five major sections:

1) Security In The News provides the top security news stories, updates and editorials describing how vulnerabilities may affect subscribers and ways to protect their networks.

2) The Internet Alert Regulator averages all Internet alert monitoring systems to provide an accurate daily alert status based on four levels: Low / Normal, Medium, High and Extreme.

3) The Internet Traffic Report gives up-to-date global Internet traffic numbers for Asia, Australia, Europe, South America and North America, as well as the overall global rating.

4) The Virus, Worm and Trojan Report provides the latest virus, worm and Trojan updates with yearly averages that define the daily threat level.

5) The Vulnerability Report updates users on the latest threats and vulnerabilities and provides solutions for these threats as they are available.

Formerly available only to Citadel licensed customers as part of the Citadel Security Portal, Citadel's 2 Minute Warning is now available as a free subscription service to security, IT and business professionals in commercial enterprises and government organizations. Interested parties may register for Citadel's free 2 Minute Warning service at http://www.Citadel.com/2MinuteWarning.

"We urge organizations in the commercial and public sectors to work with industry-leading advisors and technology solution providers to develop a proactive process for the identification and remediation of security vulnerabilities," says Solomon. "The technology and processes are available today to help organizations avoid many of the security breaches that we learn about every day. Organizations that have not implemented proven solutions for security compliance, enforcement and remediation are living in false sense of security. As a leader in this industry, we stand at the ready to assist organizations as they launch internal security defense projects in light of these public exploits."

About Citadel Hercules

With its award-winning Hercules Security Compliance and Vulnerability Remediation software solutions, Citadel helps protect an organization's network against all five classes of vulnerabilities -- software defects or patches, unsecured accounts, unnecessary services, mis-configurations and backdoors -- across a multi-platform, multi-device environment. By automating vulnerability remediation and policy enforcement processes, Citadel's customers, including the US Department of Defense, US Department of Veterans Affairs, MCI and AutoZone, have a more effective approach to protecting sensitive data and enforcing security policies across their network.

About Citadel

Citadel Security Software (NASDAQ: CDSS) delivers security solutions that enable organizations to manage risk, reduce threats and enforce compliance with security policies and regulations. Citadel's proven architecture provides a business process to manage the increasing volume, frequency and complexity of cyber security attacks. Citadel combines the world's largest active library of remediations spanning all classes of vulnerabilities with a proven delivery methodology to dramatically streamline vulnerability management and security compliance and provide ROI from the first use. Citadel solutions are used across the Department of Defense, at the Veterans Administration, and within other government and commercial organizations. For more information on Citadel, visit www.citadel.com, or call 888-8CITADEL.

Safe Harbor/Forward-looking Statements:

This press release may contain forward-looking statements that are intended to be subject to the safe harbor protection provided by Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements relate to future events or future financial performance and involve known and unknown risks and uncertainties that may cause actual results or performance to be materially different from those indicated by any forward-looking statements. In some cases, you can identify forward-looking statements by terminology such as "forecast," "may," "will," "could," "should," "anticipate," "expect," "plan," "believe," "potential" or other similar words indicating future events or contingencies. Some of the things that could cause actual results to differ from expectations are: the economic and geopolitical environment; changes in the information technology spending trends; the uncertainty of funding of government and corporate information technology security projects; the variability of the product sales cycle, including longer sales cycles for government and large commercial contracts; the uncertainty that the company's prospective deals will result in final contracts; the potential changes in the buying decision makers during a customer purchasing cycle; the complexities in scope and timing for finalization of contracts; the fluctuations in product delivery schedules; a lack of Citadel operating history; uncertainty of product development and acceptance; uncertainty of ability to compete effectively in a new market; the uncertainty of profitability and cash flow of Citadel; intellectual property rights and dependence on key personnel; economic conditions; the continued impact of terrorist attacks, global instability and potential U.S. military involvement; the competitive environment and other trends in the company's industry; the effects of inflation; changes in laws and regulations; changes in the company's business plans, including shifts to new pricing models that may cause delays in licenses; interest rates and the availability of financing; liability, legal and other claims asserted against the company; labor disputes; the company's ability to attract and retain qualified personnel; and adjustments to the amounts presented in the unaudited financial tables as a result of the completion of the audit process. For a discussion of these and other risk factors, see the company's Annual Report on Form 10-KSB for the year ended December 31, 2004, and the company's Quarterly Report on Form 10-Q for the quarter ended March 31, 2005. All of the forward-looking statements are qualified in their entirety by reference to the risk factors discussed therein. These risk factors may not be exhaustive. The company operates in a continually changing business environment, and new risk factors emerge from time to time. Management cannot predict such new risk factors, nor can it assess the impact, if any, of such new risk factors on the company's business or events described in any forward-looking statements. The company disclaims any obligation to publicly update or revise any forward-looking statements after the date of this report to conform them to actual results.

Editors Note: Citadel is a trademark and Hercules® is a registered trademark of Citadel Security Software.

Contact:
Laura Sellers
Citadel Security Software Inc.
(214) 234-2504
Email Contact

Kim Dion
BRODEUR
(415) 593-2262
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSUMMIT and CloudEXPO tell the world how they can leverage this emerging disruptive trend."
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
You want to start your DevOps journey but where do you begin? Do you say DevOps loudly 5 times while looking in the mirror and it suddenly appears? Do you hire someone? Do you upskill your existing team? Here are some tips to help support your DevOps transformation. Conor Delanbanque has been involved with building & scaling teams in the DevOps space globally. He is the Head of DevOps Practice at MThree Consulting, a global technology consultancy. Conor founded the Future of DevOps Thought Leade...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
Everyone wants the rainbow - reduced IT costs, scalability, continuity, flexibility, manageability, and innovation. But in order to get to that collaboration rainbow, you need the cloud! In this presentation, we'll cover three areas: First - the rainbow of benefits from cloud collaboration. There are many different reasons why more and more companies and institutions are moving to the cloud. Benefits include: cost savings (reducing on-prem infrastructure, reducing data center foot print, redu...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.