A plan to give control of the Internet's technical operations to a diverse range of groups, including governments and businesses, instead allowing the state sole power, is gathering international support.
Juniper Networks and Verisign have joined forces to provide a hybrid DDoS mitigation service that combines Juniper’s on premise DDoS Secure technology with Verisign’s Cloud-Based DDoS mitigation service.
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.
What’s missing today is a well-defined set of selection criteria for attack mitigation solutions, mainly for the online business market. Four types of attack mitigation solutions exist in today’s market. In regard to quality of attack mitigation, each one has its own characteristics.
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
As threats and our IT environments have become increasingly sophisticated, they’ve collided with traditional security methods that have not followed suit. Is it possible to simplify security yet increase its ‘sophistication’?