As IPv6, the new Internet protocol, moves closer to implementation, security options will be enhanced, says EMC researcher Davi Ottenheimer. But what about the new challenges? Here, he reviews what to expect.
The hotline, the communications link established between Washington and Moscow during the Cold War to avert a nuclear war, is being used to warn of potential cyber and environmental crises, the State Department's Christopher Painter says.
Here's an argument for why recent indictments linked to what's been called the largest-ever card fraud scam won't deter fraud - and why improved security is a better deterrent.
Another top-secret NSA program, exposed as a result of documents downloaded by Edward Snowden, is said to allow analysts, without authorization, to collect e-mails, online chats and browsing histories of millions of individuals.
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
NSA Deputy Director John Inglis tells a Senate panel that the agency neither fired nor admonished any personnel in connection with the leak by Edward Snowden of details about top-secret intelligence-gathering programs.
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
The team developing the cybersecurity framework that President Obama ordered is considering incorporating cyber-insurance as a component of the plan, says NIST Director Patrick Gallagher.
The National Institute of Standards and Technology has published new guidance on malware incident prevention and handling for desktops and laptops as well as enterprise patch management technologies.
How were four Russians and a Ukrainian allegedly able to steal more than 160 million payment card numbers from corporate networks over seven years? An indictment announced by U.S. Attorney Paul J. Fishman provides details.
By being transparent, federal government agencies can minimize public concern that government monitors individual speech and action on social media, new guidance from the U.S. federal CIO Council advises.
The author of the forthcoming book "Secrets and Leaks" explains why the acts of NSA whistleblower Edward Snowden don't carry the same weight as those of Pentagon Papers leaker Daniel Ellsberg.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
Izz ad-Din al-Qassam Cyber Fighters says more DDoS attacks against U.S. banks are on the way. This fourth campaign will be "a bit different," the group says. Learn what experts expect.
The National Security Agency is piloting a new program, as a result of the Edward Snowden incident, in which systems administrators with top-secret clearance can access certain secret documents only with the approval of another colleague.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.