China's Internet suffered a massive breakdown as traffic was routed to an overseas site linked to the banned religious group Falun Gong -- a fiasco a cyber-monitoring group Wednesday blamed on the country's own censors.
Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
Venafi has launched a new product that the company describes as a mobile device "kill switch" which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.
Just like football, security is a tough game and not for the faint of heart. There are threats lurking around every corner and it’s when you think you are in the clear that a blindside hit is most likely to happen.
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.
When the subject of public cloud computing comes-up, it is inevitable that the concept of ‘risk’ soon follows. But the greatest risk to an organization considering public cloud is not security, it is cost.