As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.
The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
"Cyber Atlantic 2011" aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.
EMC has acquired NetWitness, a fast-growing network monitoring and analysis firm that caters to a slew of Fortune 100 and government customers.
Thousands of cybersecurity experts from across the country and abroad will converge this week for Cyber Storm III, a three-day-long exercise designed to evaluate America's ability to respond to a cyberattack. The exercise will offer the first test of the recently devised National Cyber Incident Response Plan by simulating a large-scale assault on the nation's critical infrastructure, according to a news release. Participants are expected to include representatives from federal agencies, 11 states, 60 private companies and 12 countries. Cyber Storm exercises previously were held in 2006 and 2008. — DK
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards