FireEye has released a new report that analyzes 11 zero-day vulnerabilities discovered in 2013 by the security firm and provides context around the threats these vulnerabilities create for enterprises, along with mitigation guidance.
A plan to give control of the Internet's technical operations to a diverse range of groups, including governments and businesses, instead allowing the state sole power, is gathering international support.
The energy sector requires an approach to cybersecurity that doesn’t rely exclusively on air gaps or point-in-time detection tools but addresses the full attack continuum – before, during, and after an attack.
During the RSA Conference we heard a lot about the changing landscape of threats and how attackers are becoming more sophisticated and better funded every day. So naturally the debate ensued around whether keeping pace and ultimately closing the gap is a question of technology, spend or approach.
The worst time for an enterprise to discover a gap between what they expected and what they need is during a cyber attack. Here are five questions that enterprises should ask about actionable intelligence now, not later.