• January 3, 2013

    New Developments Emerge About E-Signing The 4506-T

    The deadline is just around the corner. Next week the I.R.S. will begin accepting electronically signed 4506-T forms. PROGRESS in Lending has been extensively covering this story since the news broke a few months ago. Today we have learned about a new development in this groundbreaking move that will once and for all enable all upfront disclosures to be e-signed. Here’s the news:


  • January 2, 2013

    Risky business: The marriage of compliance and security

    With the threat landscape expanding in every direction, it's never been more necessary for companies to ensure that their proprietary data is protected from the growing army of saboteurs intent on stealing it. Complementary to these concerns, however, is the added requirement that companies get in line with state and federal regulations and industry mandates. While many regard compliance as a headache, others recognize that ensuring an enterprise is ready for regulators can also add to its security posture. The tough part, many say, is getting the C-suite to see it that way.


  • December 12, 2012

    Necurs Rootkit – Not New But Spreading Fast Warns Microsoft; Wave's Bob Thibadeau is Quoted

    According to Microsoft, Necurs is spreading quickly and has deemed the rootkit a “prevalent threat.” Distributed mostly by drive-by downloads, the Necrus outbreak reinforces Wave’s stance that security needs to be at the hardware level beneath the malware rather than just at the software level competing with the malware. "To help mitigate such [rootkit] attacks, security professionals need to be turning their focus beyond traditional AV scanning – looking under the hood at the BIOS,” said Bob Thibadeau, chief scientist at Wave.


  • December 10, 2012

    What Technology Items Will Be Big In 2013?

    2013 will be the year of electronic signatures. Why do I say that? As I’ve been reporting over the past two months, the IRS will start accepting e-signed 4506-Ts in January as part of its Income Verification Express Service (IVES). Now the only barrier to everyone accepting e-signing is FHA. The good news there is that FHA is expected to open the door to accepting e-signatures in 2013 as well even though no formal announcement has been made yet. Once that happens there will be no barriers to e-signing adoption at all.


  • December 7, 2012

    How secure is Windows 8?

    Windows 8 has been around long enough now for any small business considering the upgrade to know if it's a good fit for them.

    However, there's one question that should always be at the forefront of any IT pro’s mind when planning a move to the new operating system (OS) that, unfortunately, often isn't. And, that question is, just how secure is Windows 8?

    Joseph Souren, vice president of hardware security vendor Wave Systems, is a self-confessed fan of Windows 8 security.


  • December 1, 2012

    Electronic Compliance: A Feasible Goal?

    The insurance industry has always been paper-bound. Each policy sold is a contract; and although intangible, the promise behind each contract is legally binding. So when insurers move to a paperless environment, they must do so with extreme care.


  • November 30, 2012

    Wave Wins Best Data Security/Loss Management Solution at 2012 GSN Homeland Security Awards

    Hundreds of the best of the homeland security community’s federal, state and municipal government officials, government contractors, systems integrators, IT vendors and physical security product and solutions providers all came together the night of November 29 in a ballroom of the Washington, D.C. convention center to receive accolades.

    The GSN awards dinner, which has become a Washington tradition over the last four years, offered a chance for the excellence and civic-minded spirit of homeland security efforts nationwide to be recognized.


  • November 15, 2012

    E-Signatures Are Now Poised To Go Mainstream

    eSignSystems is supporting and is in full compliance with recently published guidelines by the Internal Revenue Service (IRS) allowing electronic signatures on common mortgage origination documents, 4506-T and 4506-EZ. With less than 60 days to go, January 7th, 2013, marks the date that the IRS will begin accepting e-signed 4506-T documents, which will help further the adoption of e-signatures and paperless transactions throughout many financial business sectors.


  • November 9, 2012

    How to Detect Zero-Day Malware And Limit Its Impact

    Malware is becoming harder to detect using traditional security tools. Malware developers are increasingly using techniques such as polymorphism to make variants different enough from each other that they foil antivirus systems. Zero-day malware, by definition, is malware that isn’t recognized as a “known bad,” which puts IT administrators at a distinct disadvantage when it comes to fighting it.


  • October 30, 2012

    Windows 8 Security: What's New?

    Microsoft has been adding and improving advanced security features and capabilities in its Windows operating system and other applications over the past few years. Each iteration of Windows has featured improved security—necessary to withstand the constant barrage of attacks—and Windows 8 coming is no exception.


  • October 30, 2012

    Is Windows 8 in Your Future?

    Windows 8 is a major step forward for Microsoft, but one it has to take in order to stay relevant in a world where the PC has become a peer among a multitude of devices. Gartner highlights our latest research on Windows 8, its tablet-like interface, and this new era for Microsoft's flagship OS.


  • October 30, 2012

    Windows 8 Security Report Card

    In the run-up to the launch of Microsoft’s Windows 8, much has been said about the new user interface because, on the surface, Windows 8 looks very different to anything Microsoft has done before. But is that true when it comes to security? If Microsoft is to win back the enterprise as it goes in pursuit of tablets and other mobile devices, security is an important factor.

    Microsoft’s decision brings the Trusted Platform Module (TPM) and optional use of self-encrypting drives (SEDs) into the mainstream for enterprises.


  • October 30, 2012

    Windows 8 Enables Microsoft to Take Stronger Role in Trusted Security

    There are three security features in the Trusted Platform Module (TPM) that are at the core of Windows, said Steven Sprague, CEO of Wave Systems, a maker of third party security software for Windows systems.

    Although these features of Trusted Computing are in Windows 7, a lot of users may not be aware of them, said Sprague.

    “Most people don’t know that it’s in the box and so we’re actually very pleased to see Microsoft really for the first time in the operating system, [offer] the full use of Trusted Computing with the Windows 8 operating system,” he said.


  • October 22, 2012

    Windows 8 security: how does it measure up?

    Microsoft's Windows 8 is seen by many as representing an evolutionary jump for the operating system (OS), but what about security? Has there been an evolutionary leap there?

    In the run-up to the launch, much has been said about the new user interface because, on the surface, Windows 8 looks very different to anything Microsoft has done before.

    But is that true when it comes to security? If Microsoft is to win back the enterprise as it goes in pursuit of tablets and other mobile devices, security is likely to be an important factor.



  • October 18, 2012

    Wave Exec Sees Trusted Computing Gains with Windows 8 and 'Secure Boot'

    A new "secure boot" firmware protocol that Microsoft will support with Windows 8 may have stirred up controversies, but it's all old hat for companies like Wave Systems Corp.