Mexico ordered an investigation into allegations that the United States spied on the emails of its president and his predecessor, the latest diplomatic wrangle stemming from America's intelligence-gathering efforts.
The National Security Agency is gathering email and instant messenger contact lists from hundreds of millions of ordinary citizens worldwide, many of them Americans, The Washington Post reported late Monday.
These complimentary educational sessions are designed to be a highly interactive, and bring together industry practitioners from the National Cyber Security Alliance, Cloud Security Alliance and industry partners to help you combat the cyber underworld.
Compliance is a byproduct of a solid security program – but that doesn’t mean it’s simple. Compliance can involve technical architecture and operational processes that many organizations simply don’t understand or don’t want to bother with.
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Examples of dangerous automatic security reactions turning into a liability are not limited to science fiction; In fact, the recent Snowden affair of publicizing some of the NSA’s secrets gives at least two examples of such liabilities for both parties engaged in this battle.
As the use of Secure Shell (SSH) keys and related encryption services evolves and expands, security experts question what drives that evolution and are looking for ways to maximize the security effectiveness of the ubiquitous technology.
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.
Despite the billions of dollars spent annually by government and private industry to protect their networks and critical data assets, the large majority of breaches can be tied directly to human error and/or a breakdown in protocol.
In order to win the war with today’s cybercriminals that are using the same attack vectors on a massive scale, a real-time, automated information platform that pre-empts ongoing attacks is an imperative.