Security Experts:

long dotted


Cisco is revamping its security ecosystem to increase the focus on its Identity Services Engine, which would help enterprises deploy layered defenses without increasing complexity.
During the House’s Energy and Commerce Committee's cybersecurity hearing, Representatives Henry Waxman and Ed Markey released a report detailing the risks faced by the nation’s power grid.
Recent problems with revoking SSL certificates have renewed discussion on whether the certificate system is still sufficient to protect users on the Internet.
The Splunk App for Enterprise Security v2.4, combined creates a security intelligence platform that helps organizations find unknown threats in real time.
ICS-CERT has issued a warning this week after vulnerability details concerning Mitsubishi’s MX Component started to gain attention online.
Last week at the RSA Conference, nCircle surveyed 205 people about their thoughts on various security measures and their effectiveness against state-sponsored attacks. The survey focused on endpoint protections and perimeter defenses.
The British military's dependence on information technology means it could be "fatally compromised" by a cyber-attack but the government seems unprepared for such an event, lawmakers warned.
Only one in ten organizations has the skills needed in advanced technologies such as business analytics, mobile computing, cloud computing, and social business, IBM found.
Radware claims that its upgraded DefensePro x420 can handle up to 25 million packets per second of attack traffic (regardless of packet size) and a throughput of 40Gbps.
Less than a quarter of state chief information security officers were confident in their states' ability to safeguard data from attacks, according to a recent Deloitte & Touche survey.

FEATURES, INSIGHTS // Security Architecture

rss icon

Avi Chesla's picture
The following predictions may help change these static roles, and allow you to look ahead at the upcoming threat trends to proactively plan your defense strategy.
Dr. Mike Lloyd's picture
2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?
Ram Mohan's picture
Governments and organizations should make sure that technical and political implications are fully understood by all parties before blocking policies are developed. At the very least, any DNS blocking actions should be disclosed to all affected parties.
Danelle Au's picture
Many organizations looking at security for virtualized and cloud environments automatically assume that it is a choice between one or the other. The answer may vary based on your architecture, but there is a place for both.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Chris Hinkley's picture
Putting business continuity plans in place now, means you won’t have to scramble when it’s time to call upon your disaster recovery plan.
Avi Chesla's picture
Software Defined Secured Networking (SDSN) allows not only for the acceleration of networking innovation, but will also dramatically change the way we think about security.
Chris Poulin's picture
Part 1: Why the Star Trek Medical Tricorder Didn’t have an App Store. The future of information security is looking brilliant: by the 23rd century there will be no computer hacks—at least according to Star Trek.
Eric Knapp's picture
This is the third in a series of articles on the new “3x3” security model for critical infrastructure cyber security. This week, Eric discusses host security needs in the device network.
Marc Solomon's picture
There’s aspect of the cloud that has largely gone ignored and that’s the fact that the cloud can be a tremendous security enabler.