According to Mandiant’s M-Trends report, organizations are discovering breaches in their networks faster, but still not nearly soon as they must in order to contain damage and prevent loss of sensitive data.
The chairman of a new German parliamentary panel probing mass surveillance by the NSA abruptly quit on April 9, rejecting opposition demands that the body question fugitive US intelligence leaker Edward Snowden.
In a speech at the PLA's National Defense University, Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and avoid an inadvertent conflict, a senior defense official said.
In a speech at the PLA's National Defense University, US Defense Secretary Chuck Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and prevent a potential crisis.
Seattle, Washington-based network security firm WatchGuard Technologies has added a new level of defense to its Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) appliances to help block Advance Persistent Threats.
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Because transactions using virtual currencies happen anonymously, they confuse issues of jurisdiction and can become difficult to enforce. When authorities do take action, cybercrime simply re-images itself with a new currency and a new platform.
As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation of trust in the Internet as a shared commons has been thoroughly undermined.