Last week at the RSA Conference, nCircle surveyed 205 people about their thoughts on various security measures and their effectiveness against state-sponsored attacks. The survey focused on endpoint protections and perimeter defenses.
DHS Secretary Janet Napolitano met with the Homeland Security Advisory Council’s (HSAC) Task Force on CyberSkills this week, where they discussed the latest developments in improving the agency’s cybersecurity initiatives.
Governments and organizations should make sure that technical and political implications are fully understood by all parties before blocking policies are developed. At the very least, any DNS blocking actions should be disclosed to all affected parties.
Many organizations looking at security for virtualized and cloud environments automatically assume that it is a choice between one or the other. The answer may vary based on your architecture, but there is a place for both.
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Part 1: Why the Star Trek Medical Tricorder Didn’t have an App Store. The future of information security is looking brilliant: by the 23rd century there will be no computer hacks—at least according to Star Trek.
SCADA networks are the most unprotected networks of all and now cyber-criminals have them in their sights. If they get access, the consequences for many organizations, their customers and perhaps the population at large, could be extremely damaging.