Attackers hacking into American computer networks appear to be leaving "cyber fingerprints" to send a message that critical systems are vulnerable, Admiral Michael Rogers, director of the NSA and head of US Cyber Command, said Thursday. [Read More]
Internet security experts have set up "Project Honey Train" with an online railway control system as bait, hoping to "get inside the heads of cyber criminals" -- but without the real-life casualties. [Read More]
Industry professionals applauded the steps by the White House to promote cyber threat information sharing, but an executive order can only go so far and more is needed than just information sharing to combat sophisticated cyber attacks, experts said. [Read More]
UK-based Semiconductor technology firm ARM Ltd. announced on Monday that PolarSSL, the open source Transport Layer Security (TLS) solution for software and embedded devices, has been rebranded as “ARM mbed TLS”. [Read More]
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
While intelligence is a critical component of a mature security program, it should not drive security. A risk-driven approach provides a much more comprehensive and scientific approach that allows organizations to keep pace with today’s sophisticated threats.