Joe Weiss of Applied Control Solutions, John Mallery of MIT, and Jeffrey Carr of Taia Global will hold a panel discussion at Suits and Spooks New York on where the tipping point lies for a cyber attack to turn into a catastrophe.
China's Internet suffered a massive breakdown as traffic was routed to an overseas site linked to the banned religious group Falun Gong -- a fiasco a cyber-monitoring group Wednesday blamed on the country's own censors.
Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
Just like football, security is a tough game and not for the faint of heart. There are threats lurking around every corner and it’s when you think you are in the clear that a blindside hit is most likely to happen.
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.
When the subject of public cloud computing comes-up, it is inevitable that the concept of ‘risk’ soon follows. But the greatest risk to an organization considering public cloud is not security, it is cost.