Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

IBM launched its z13 mainframe, what it says is one of the most sophisticated computer systems ever built, designed to deliver massive scalability together with real-time encryption and analytics to help support the demands of the mobile economy.
A survey from the Cloud Security Alliance found that IT managers and executives still have some trepidation about the security of data in the cloud.
Analysis of the Naenara Browser, a version of Mozilla Firefox modified by North Korea and bundled into Red Star OS, shows the DPRK may be funneling all traffic through one—or a handful—of public IP addresses.
Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier.
South Korea on Thursday ruled out the possibility that a recent string of cyber-attacks on its nuclear power operator could cause a malfunction at any of the country's 23 atomic reactors.
South Korea has heightened its security readiness against cyber attacks as concerns grew over a series of online information leaks at nuclear power plants.
South Korea's nuclear power plant operator launched a two-day drill to test its ability to thwart a cyber attack, after a series of online information leaks by a suspected hacker.
Attackers who recently breached some ICANN systems did not obtain access to the IANA functions systems, the organization said.
A spearfishing attack aimed at ICANN hooked staff members with emails crafted to appear as though they were sent from peers using "icann.org" addresses.
Google has released a new version of End-to-End, an open source encryption extension for Chrome introduced by the company earlier this year.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Marc Solomon's picture
The threat landscape is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defenses.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.
David Holmes's picture
The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. But what really caused disrupted service across New Zealand’s major ISPs?
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
James McFarlin's picture
If North Korea is connected to the Sony attacks, it would be an archetypal example of such a weaker state using cyber operations to level the playing field in potential confrontations with the United States.