Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Japan's National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there were 25.66 billion attempts to compromise systems, according to a report.
The developers of the advanced purely-functional programming language Haskell are investigating a data breach identified by the organization’s hosting provider.
FireEye's Global Threat Intelligence Sharing initiative will allow customers to bi-directionally share threat intelligence in near real-time.
Register for this webcast to learn how you can align, automate and enforce controls to security and compliance policies - while providing visualization, workflow and reporting critical to improving operational efficiency and reducing audit costs.
The US Army Research Laboratory (ARL) has released the source code for Dshell, a framework that can be used to analyze cyberattacks.
Information-sharing is one of those phrases that get thrown around a lot, but there isn't a lot of agreement on how organizations should be working together or the methods they should be using.
LightCyber, an Israel-based security breach detection and response solutions provider, today announced an improved version of its LightCyber Magna platform.
The US Federal Trade Commission called for better privacy and security to be built into the myriad of connected devices, for fitness, smart homes or other uses.
Suits and Spooks DC will be held at the Ritz-Carlton, Pentagon City on February 4-5. Take a look at the agenda to see why this will be one of the hottest events of the year!
Organizations are increasing investment in IT security, but aren't thinking beyond perimeter-based defenses, according to the latest Ponemon Institute survey.

FEATURES, INSIGHTS // Network Security

rss icon

Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
Marc Solomon's picture
The threat landscape is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defenses.
David Holmes's picture
The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. But what really caused disrupted service across New Zealand’s major ISPs?
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Rebecca Lawson's picture
Moving towards an adaptive and automated way of applying intelligence based on behavior and heuristics is clearly moving in the right direction to enable a more actionable and relevant set of controls.
David Holmes's picture
Since its inception, SSL has been plagued by “man-in-the-middle” attacks, and in the past the twenty years, only slight progress has been made toward properly defending against it.
Tal Be'ery's picture
Passwords needs to be strong enough to resist a guessing attack, often named a "Brute-force" attack. The brute-force attack comes in two flavors: online and offline.
Pat Calhoun's picture
A growing number of corporate IT and security personnel have something in common with extreme athletes: they take unnecessary security risks.
Scott Gainey's picture
Panic triggers a response that often leads to potentially catastrophic mistakes. Those mistakes come as we grasp for short-term fixes that give us a stronger sense of control, but don’t take long term consequences into account.