Stern oversight in the United States
U.S. agencies argue that monitoring social media will arm them with “situational awareness” to thwart potential attacks.
March 01, 2012
U.S. agencies argue that monitoring social media will arm them with “situational awareness” to thwart potential attacks.
…nevertheless, companies need to do a better job of protecting IP, says Adam Segal.
The threat posed by politically motivated attackers, known as hacker activists, or hacktivists, is far-reaching, yet authorities are finding it difficult to take down a structurally decentralized movement.
More-than-decade-old bugs still plague web applications, and the challenge is only growing for programs migrating to the cloud. But new frameworks and heightened awareness can mitigate the threat.
Stephen Scarf was a history major and an English minor in college. He then negotiated a diverse career path to reach his current role as global CISO of Experian. But, he wouldn’t change a thing.
Web applications remain a primary vector for attack, and the higher education space remains fertile ground for successful breaches. That’s why West Virginia University wanted to take a proactive approach.
DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.
No single reported breach in recent memory better highlighted the risk that vulnerable third-parties present than when hackers last year raided Epsilon.
The attack du jour, APTs, or advanced persistent threats, are real threats.
Threat of the month: Compromised embedded systems