Security Experts:

Security Infrastructure
long dotted

NEWS & INDUSTRY UPDATES

Security experts weigh in on what they would like to see in 2015 to make their jobs wrangling users, infrastructure, and data easier.
South Korea on Thursday ruled out the possibility that a recent string of cyber-attacks on its nuclear power operator could cause a malfunction at any of the country's 23 atomic reactors.
South Korea has heightened its security readiness against cyber attacks as concerns grew over a series of online information leaks at nuclear power plants.
South Korea's nuclear power plant operator launched a two-day drill to test its ability to thwart a cyber attack, after a series of online information leaks by a suspected hacker.
Attackers who recently breached some ICANN systems did not obtain access to the IANA functions systems, the organization said.
A spearfishing attack aimed at ICANN hooked staff members with emails crafted to appear as though they were sent from peers using "icann.org" addresses.
Google has released a new version of End-to-End, an open source encryption extension for Chrome introduced by the company earlier this year.
Web browsers should inform users when they are accessing a website over the Hypertext Transfer Protocol (HTTP) to make them aware of the fact that there is no data security, the Chrome Security Team said in a proposal published over the weekend.
According to a survey of employees from organizations in the U.S., U.K., France and Germany found that 71 percent of end users said they had access to data they should not see.
The popular open source intrusion prevention system (IPS) Snort has been completely rewritten and fitted with several new features, Cisco announced on Thursday.

FEATURES, INSIGHTS // Security Infrastructure

rss icon

David Holmes's picture
The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. But what really caused disrupted service across New Zealand’s major ISPs?
Avi Chesla's picture
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
James McFarlin's picture
If North Korea is connected to the Sony attacks, it would be an archetypal example of such a weaker state using cyber operations to level the playing field in potential confrontations with the United States.
Rebecca Lawson's picture
Moving towards an adaptive and automated way of applying intelligence based on behavior and heuristics is clearly moving in the right direction to enable a more actionable and relevant set of controls.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
Adam Firestone's picture
Security requirements for information assurance, risk management, and certification and accreditation constrain Government organizations with respect to software allowed on Government networks.
Jason Polancich's picture
Starting your own private ISAC is easier and more important long-term than you might think.
Nate Kube's picture
When designing for the OT environment, we should review outdated paradigms, and consider newer technologies and the operational realities of the environment.
Travis Greene's picture
Just as automation is applied to the process of Access Certification, the process of revocation needs automation to deliver an Access Governance program that not only satisfies compliance mandates, but actually reduces risk.