Cyber insurance can pay out millions to cover the cost of data breach liability, but buying the policies can be a nightmare for info security pros, and premiums for similar coverage can vary wildly.
Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the big Interop conference in Las Vegas his list of a dozen mostly free “killer” tools.
Terrorists are developing and distributing encryption tools that protect privacy of their communications, and other apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.
The Interop conference convening this week will be a far cry from the gathering of a small group of technology pioneers who sought interoperability among Internet devices 30 years ago.
Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.
Fortinet is embarking on a mission for its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.
Goal is rapid discovery of attacks and creating defenses against them. Recently Network World spoke about the hurdles left to get over with Palo Alto’s CSO Rick Howard.
The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.
Questions and answers about first draft of how to deal with law enforcement’s need to access encrypted information
The first proposed draft US federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a terrorist in San Bernardino.
PowerShell used as a tool in compound malware attacks is becoming more common, with 38% of all attacks seen by CarbonBlack and its partners involving the native Windows scripting language.
Startup Seceon has joined a growing number of firms focused on quickly analyzing behaviors on corporate network to identify and prioritize threats that ought to be dealt with, cutting down on the manual work required to spot and stop attacks.
The common practice of incorporating existing open source code in new software leaves the product open to unanticipated vulnerabilities that could be exploited by attackers.
The FBI is helping Arkansas prosecutors break into an iPhone and iPad looking for evidence in a murder trial, and it’s without asking Apple for help.
Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation Award in the Computing Sciences.