Shodan, the specialized search engine that lets users search for Internet-connected devices rather than web sites, today launched Shodan Maps, a new feature designed to let users see search results on a map instead of a regular (text) listing.
Indonesia described as "mind-boggling" a report that Australian spies targeted Jakarta during a trade dispute with Washington, as a new espionage row erupted during a visit by US Secretary of State John Kerry.
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Zero Trust advocates for a segmented network, and security built into the architecture rather than an afterthought. It also advocates for some key principles built around the concept of “never trust, always verify”.