The director of the US Office of Personnel Management resigned Friday after a devastating hack of government databases that saw the personal information of millions of federal workers and contractors stolen.
Splunk, a provider of software that helps organizations gather and make use of machine data from a various sources, announced on Thursday that is has acquired Caspida, a maker of machine learning and behavioral analytics software.
The official Call for Papers for the 2015 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 26 – 29, 2015 at the Georgia Tech Hotel and Conference Center in Atlanta is now open.
Yahoo! Chief Information Security Officer (CISO) Alex Stamos said on Wednesday night that he will be leaving the iconic Internet company to take on the role of Chief Security Officer (CSO) at Facebook.
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
When rock stars use their platforms to harp on populist issues or bring attention to themselves or their agendas, it comes at the expense of all of these challenges. In my view, this does not help advance the state of security.
In response to the uptick in cyber-attacks, legislators and industry governing bodies alike have started to revise their guidelines to emphasize the implementation of a pro-active, risk-based approach to security over the traditional check-box mentality.
Cyber security is a nation-first, vendor-second issue. Recent events have frighteningly underscored the requirement to fundamentally rethink our approach to information security lest our economy, our very way of life suffer drastically.
With your own internal cyber bounty program designed to reward your best assets at their positions, you can begin to see real results against attackers and build a team that will compete over the long haul.