SYS-CON MEDIA Authors: Pat Romanski, Gary Arora, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

News Feed Item

Citadel Responds to Latest Cyber Theft Events With New Security Service to Protect Computer Networks

Free Daily Service Identifies New Threats and Recommends Steps to Defend Networks Against Cyber Attacks

DALLAS, TX -- (MARKET WIRE) -- 06/20/05 -- In response to the recent series of major computer system breaches, Citadel Security Software Inc. (NASDAQ: CDSS), a leader in enterprise vulnerability management and policy enforcement solutions, has increased its efforts to educate public, private and academic organizations about network security best practices. Today Citadel introduced a daily security news service that provides up-to-the-minute threat alerts, recommended actions to thwart attacks, and headline news in a radio-style broadcast. This free subscription service enables network security professionals to stay abreast of new vulnerabilities and quickly develop plans to mitigate risk and maintain security compliance.

Because of the serious and ongoing nature of security breaches at some of the country's leading businesses, Citadel decided to offer its "Citadel 2 Minute Warning - A Daily Security Briefing" free to customers and non-customers alike. By doing so, Citadel aims to build awareness of the ever-widening range of exploitable vulnerabilities, promote the aggressive implementation of security measures, and minimize the damage caused by security exploits. In addition, Citadel customers can proactively remove any vulnerabilities before they are exploited using the company's award-winning Hercules automated vulnerability remediation solution.

"When I testified before a Congressional panel a year ago, I warned that the dangerous state of exploitable vulnerabilities in computer systems presented serious risks to the U.S. economy and even our way of life," said Steve Solomon, CEO of Citadel Security Software. "The technology sector is responding to this danger with tools that have proven to be successful in protecting networks from the constant onslaught of security threats. This country and its leaders must act with urgency to invest in security measures that will defend our nation's critical infrastructures."

While progress has been made in the government and private sectors, the recent string of significant breaches demonstrates there is more to be done -- and quickly -- to prevent attacks that may threaten economic stability and national security. The latest breach announced by MasterCard International at its credit card processing provider, CardSystems Solutions, Inc., underscores the importance of enforcing minimum security requirements for participating companies throughout the credit card industry supply chain. This step would "operationalize" information security as a routine business process and improve compliance with current statutory and regulatory requirements for security and privacy.

"Improving the cyber security profile of this nation must be a collaborative effort among public, private and academic sectors that are entrusted with personal information and other sensitive data," said Bob Dix, Citadel Vice President and former Staff Director of the House Government Reform Subcommittee on Technology during the 108th Congress. "Awareness through education is the first step in the development of a consistent and repeatable process for security compliance. We also need incentives that recognize the proactive efforts organizations are taking to protect networks against security threats and exploits."

"The recent highly publicized exploits, including the breach announced by MasterCard at its third-party credit card processing provider, is a manifestation of our nation's unprotected infrastructure resulting from the lack of investment in proactive technology to not only identify and respond to threats but to automate the removal of known vulnerabilities," said James C Foster, Deputy Director of Global Security Solutions for CSC and author of the best-selling book, "Buffer Overflow Attacks." "Companies need to implement technologies that not only create but enforce comprehensive security compliance policies to eliminate vulnerabilities from their networks before events like this occur."

About Citadel's 2 Minute Warning - A Daily Security Briefing

Citadel's 2 Minute Warning is an enhanced service offering that leverages Citadel's vast library of 23,000 remedies to known system vulnerabilities. These remedies, when applied in a timely manner, strengthen the security posture of an organization's network. Citadel's V-Flash Team of security analysts and remediation experts fuel the daily briefings with around-the-clock research to alert subscribers to their current threat exposure, identify new exploits, worms and viruses, and recommend specific security measures to prevent attacks.

Citadel's 2 Minute Warning is composed of five major sections:

1) Security In The News provides the top security news stories, updates and editorials describing how vulnerabilities may affect subscribers and ways to protect their networks.

2) The Internet Alert Regulator averages all Internet alert monitoring systems to provide an accurate daily alert status based on four levels: Low / Normal, Medium, High and Extreme.

3) The Internet Traffic Report gives up-to-date global Internet traffic numbers for Asia, Australia, Europe, South America and North America, as well as the overall global rating.

4) The Virus, Worm and Trojan Report provides the latest virus, worm and Trojan updates with yearly averages that define the daily threat level.

5) The Vulnerability Report updates users on the latest threats and vulnerabilities and provides solutions for these threats as they are available.

Formerly available only to Citadel licensed customers as part of the Citadel Security Portal, Citadel's 2 Minute Warning is now available as a free subscription service to security, IT and business professionals in commercial enterprises and government organizations. Interested parties may register for Citadel's free 2 Minute Warning service at

"We urge organizations in the commercial and public sectors to work with industry-leading advisors and technology solution providers to develop a proactive process for the identification and remediation of security vulnerabilities," says Solomon. "The technology and processes are available today to help organizations avoid many of the security breaches that we learn about every day. Organizations that have not implemented proven solutions for security compliance, enforcement and remediation are living in false sense of security. As a leader in this industry, we stand at the ready to assist organizations as they launch internal security defense projects in light of these public exploits."

About Citadel Hercules

With its award-winning Hercules Security Compliance and Vulnerability Remediation software solutions, Citadel helps protect an organization's network against all five classes of vulnerabilities -- software defects or patches, unsecured accounts, unnecessary services, mis-configurations and backdoors -- across a multi-platform, multi-device environment. By automating vulnerability remediation and policy enforcement processes, Citadel's customers, including the US Department of Defense, US Department of Veterans Affairs, MCI and AutoZone, have a more effective approach to protecting sensitive data and enforcing security policies across their network.

About Citadel

Citadel Security Software (NASDAQ: CDSS) delivers security solutions that enable organizations to manage risk, reduce threats and enforce compliance with security policies and regulations. Citadel's proven architecture provides a business process to manage the increasing volume, frequency and complexity of cyber security attacks. Citadel combines the world's largest active library of remediations spanning all classes of vulnerabilities with a proven delivery methodology to dramatically streamline vulnerability management and security compliance and provide ROI from the first use. Citadel solutions are used across the Department of Defense, at the Veterans Administration, and within other government and commercial organizations. For more information on Citadel, visit, or call 888-8CITADEL.

Safe Harbor/Forward-looking Statements:

This press release may contain forward-looking statements that are intended to be subject to the safe harbor protection provided by Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements relate to future events or future financial performance and involve known and unknown risks and uncertainties that may cause actual results or performance to be materially different from those indicated by any forward-looking statements. In some cases, you can identify forward-looking statements by terminology such as "forecast," "may," "will," "could," "should," "anticipate," "expect," "plan," "believe," "potential" or other similar words indicating future events or contingencies. Some of the things that could cause actual results to differ from expectations are: the economic and geopolitical environment; changes in the information technology spending trends; the uncertainty of funding of government and corporate information technology security projects; the variability of the product sales cycle, including longer sales cycles for government and large commercial contracts; the uncertainty that the company's prospective deals will result in final contracts; the potential changes in the buying decision makers during a customer purchasing cycle; the complexities in scope and timing for finalization of contracts; the fluctuations in product delivery schedules; a lack of Citadel operating history; uncertainty of product development and acceptance; uncertainty of ability to compete effectively in a new market; the uncertainty of profitability and cash flow of Citadel; intellectual property rights and dependence on key personnel; economic conditions; the continued impact of terrorist attacks, global instability and potential U.S. military involvement; the competitive environment and other trends in the company's industry; the effects of inflation; changes in laws and regulations; changes in the company's business plans, including shifts to new pricing models that may cause delays in licenses; interest rates and the availability of financing; liability, legal and other claims asserted against the company; labor disputes; the company's ability to attract and retain qualified personnel; and adjustments to the amounts presented in the unaudited financial tables as a result of the completion of the audit process. For a discussion of these and other risk factors, see the company's Annual Report on Form 10-KSB for the year ended December 31, 2004, and the company's Quarterly Report on Form 10-Q for the quarter ended March 31, 2005. All of the forward-looking statements are qualified in their entirety by reference to the risk factors discussed therein. These risk factors may not be exhaustive. The company operates in a continually changing business environment, and new risk factors emerge from time to time. Management cannot predict such new risk factors, nor can it assess the impact, if any, of such new risk factors on the company's business or events described in any forward-looking statements. The company disclaims any obligation to publicly update or revise any forward-looking statements after the date of this report to conform them to actual results.

Editors Note: Citadel is a trademark and Hercules® is a registered trademark of Citadel Security Software.

Laura Sellers
Citadel Security Software Inc.
(214) 234-2504
Email Contact

Kim Dion
(415) 593-2262
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions.
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Keeping an application running at scale can be a daunting task. When do you need to add more capacity? Larger databases? Additional servers? These questions get harder as the complexity of your application grows. Microservice based architectures and cloud-based dynamic infrastructures are technologies that help you keep your application running with high availability, even during times of extreme scaling. But real cloud success, at scale, requires much more than a basic lift-and-shift migrati...
David Friend is the co-founder and CEO of Wasabi, the hot cloud storage company that delivers fast, low-cost, and reliable cloud storage. Prior to Wasabi, David co-founded Carbonite, one of the world's leading cloud backup companies. A successful tech entrepreneur for more than 30 years, David got his start at ARP Instruments, a manufacturer of synthesizers for rock bands, where he worked with leading musicians of the day like Stevie Wonder, Pete Townsend of The Who, and Led Zeppelin. David has ...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Addteq is a leader in providing business solutions to Enterprise clients. Addteq has been in the business for more than 10 years. Through the use of DevOps automation, Addteq strives on creating innovative solutions to solve business processes. Clients depend on Addteq to modernize the software delivery process by providing Atlassian solutions, create custom add-ons, conduct training, offer hosting, perform DevOps services, and provide overall support services.
Contino is a global technical consultancy that helps highly-regulated enterprises transform faster, modernizing their way of working through DevOps and cloud computing. They focus on building capability and assisting our clients to in-source strategic technology capability so they get to market quickly and build their own innovation engine.
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...