Security Experts:

long dotted


Joe Weiss of Applied Control Solutions, John Mallery of MIT, and Jeffrey Carr of Taia Global will hold a panel discussion at Suits and Spooks New York on where the tipping point lies for a cyber attack to turn into a catastrophe.
AIG has expanded its cyber insurance offering to include property damage and bodily injury that could be caused as a result of cyber attacks.
Healthcare organizations are still struggling with information sharing both internally and externally, participants in an industry-wide cyber-security exercise said.
Lockheed Martin will acquire a privately held Industrial Defender, a provider of cyber security solutions for control systems in the oil and gas, utility and chemical industries.
When it comes to securing a Linux machine, the answer is not installing an antivirus or some other security software. The key lies in hardening the operating system.
At the Cybertech Conference, Lockheed Martin and IBM both announced they would invest in CyberSpark R&D facilities, joining other cybersecurity leaders.
China's Internet suffered a massive breakdown as traffic was routed to an overseas site linked to the banned religious group Falun Gong -- a fiasco a cyber-monitoring group Wednesday blamed on the country's own censors.
Industry-wide cyber attack exercises (CyberRX) will examine broad and segment-specific threats targeting information systems, medical devices and other essential technology resources of the healthcare industry.
Keeping to tradition, SecurityWeek invited security experts to weigh in on New Year's resolutions for improving information security and how organizations can better develop new habits in 2014.
Venafi has launched a new product that the company describes as a mobile device "kill switch" which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.

FEATURES, INSIGHTS // Security Architecture

rss icon

Ram Mohan's picture
Despite its popularity, security issues exist with outsourcing; to avoid trouble down the road, a proactive, thoughtful and thorough approach at the beginning of the process usually helps.
Dr. Mike Lloyd's picture
Continuous monitoring is a call for maturity in our risk management and assessment processes – check that we’ve locked the doors and that the barn door is closed before the inevitable attack comes.
Shaun Donaldson's picture
When the subject of public cloud computing comes-up, it is inevitable that the concept of ‘risk’ soon follows. But the greatest risk to an organization considering public cloud is not security, it is cost.
Mark Hatton's picture
There is an old saying, that if you want to get ahead, don’t bring your boss problems, bring him or her solutions. The same can be said when it comes to investing in security solutions.
Chris Hinkley's picture
Scaling a company or a critical application within can be as scary as it is exciting. IT stakeholders must be part of a proactively designed strategy that’s ready to be deployed at a moment’s notice. Luckily, you can get well on your way to keep performance and security intact while you scale, by ticking three boxes.
Danelle Au's picture
Along with the deployment of a robust security architecture is the need for a monitoring and response process that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data if something suspicious is found.
Chris Hinkley's picture
If one of your New Year’s resolutions is to stop threats before they hit your environment, here are three security must-haves for 2013.
Wade Williamson's picture
Developing our own search skills will not only expose us to lots of interesting information, but can also significantly improve our own security posture.
Avi Chesla's picture
The following predictions may help change these static roles, and allow you to look ahead at the upcoming threat trends to proactively plan your defense strategy.
Dr. Mike Lloyd's picture
2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?