Cyber cold war: Espionage and warfare
When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.
When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.
With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.
President Obama now is considering an executive order to breathe some life back into the Cyber Security Act of 2012 with the goal in mind to protect the country’s critical infrastructure.
Policies form the cornerstone of the information security program and are instrumental for enforcing global consistency, driving change and launching enterprise programs.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
The head of the NSA, the entity many consider to be the prime culprit in the “surveillance state,” sought to persuade the crowd at the annual DefCon hacker gathering to enter government service.
Unauthorized information disclosure via “paste” sites has been a common occurrence as a part of recent high-profile information security breaches.
We need to consider all of the traditional facets of information security when we consider protecting information on the internet.
The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news
Lancope has appointed Tom Cross as director of security research, Wells Fargo & Co. has named Rich Baich CISO, and other personnel announcements and corporate happenings.