DHS Secretary Janet Napolitano met with the Homeland Security Advisory Council’s (HSAC) Task Force on CyberSkills this week, where they discussed the latest developments in improving the agency’s cybersecurity initiatives.
The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern information security.
GlobalSign announced a partnership with Netcraft that will allow GlobalSign to provide its SSL Certificate customers with real-time alerts that warn them when their websites are compromised and used to support phishing attacks.
Part 1: Why the Star Trek Medical Tricorder Didn’t have an App Store. The future of information security is looking brilliant: by the 23rd century there will be no computer hacks—at least according to Star Trek.
SCADA networks are the most unprotected networks of all and now cyber-criminals have them in their sights. If they get access, the consequences for many organizations, their customers and perhaps the population at large, could be extremely damaging.
To get the most value from your security information you need to be correlating your data. Adding context to data gives you information. Correlation adds even more information by evaluating relationships between pieces of information.
Ever wonder why Frederick the Great was called Frederick the Great? He was smart enough to identify immediate threats, concentrate his forces, and move effectively against one enemy at a time. What relevance does this has to enterprise security?