Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The Department of Defense will require defense contractors to incorporate established information security standards on their unclassified networks and to report cyber-intrusion incidents that result in the loss of unclassified controlled technical information.
Implementing a more mature cyber security profile within automation means an investment in both time and resources. Being able to measure business performance in real-time is the first step in justifying the ROI of this much-needed increase in cyber security controls.
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
Please join Trend Micro and SecurityWeek on Wednesday, Oct. 30th at Neptune's Waterfront Grill & Bar in San Francisco for an interactive security event with great food and open bar!
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
The National Security Agency is gathering email and instant messenger contact lists from hundreds of millions of ordinary citizens worldwide, many of them Americans, The Washington Post reported late Monday.
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
These complimentary educational sessions are designed to be a highly interactive, and bring together industry practitioners from the National Cyber Security Alliance, Cloud Security Alliance and industry partners to help you combat the cyber underworld.
Outgoing DHS Secretary Janet Napolitano warned of a "major cyber event" in the future that would have a "serious" impact on American society.

FEATURES, INSIGHTS // Security Architecture

rss icon

Chris Hinkley's picture
Scaling a company or a critical application within can be as scary as it is exciting. IT stakeholders must be part of a proactively designed strategy that’s ready to be deployed at a moment’s notice. Luckily, you can get well on your way to keep performance and security intact while you scale, by ticking three boxes.
Danelle Au's picture
Along with the deployment of a robust security architecture is the need for a monitoring and response process that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data if something suspicious is found.
Chris Hinkley's picture
If one of your New Year’s resolutions is to stop threats before they hit your environment, here are three security must-haves for 2013.
Wade Williamson's picture
Developing our own search skills will not only expose us to lots of interesting information, but can also significantly improve our own security posture.
Avi Chesla's picture
The following predictions may help change these static roles, and allow you to look ahead at the upcoming threat trends to proactively plan your defense strategy.
Dr. Mike Lloyd's picture
2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?
Ram Mohan's picture
Governments and organizations should make sure that technical and political implications are fully understood by all parties before blocking policies are developed. At the very least, any DNS blocking actions should be disclosed to all affected parties.
Danelle Au's picture
Many organizations looking at security for virtualized and cloud environments automatically assume that it is a choice between one or the other. The answer may vary based on your architecture, but there is a place for both.
Matthew Stern's picture
Successful conduct of military operations requires a unit’s clear understanding of the battle space it controls and its “area of operations”. This includes not only the terrain of the battlefield but also the capabilities, motives, and determination of the enemy they face.
Chris Hinkley's picture
Putting business continuity plans in place now, means you won’t have to scramble when it’s time to call upon your disaster recovery plan.