How should the U.S. respond to state-sponsored cyberattacks?
It's no secret that U.S. government agencies and businesses are the target of around-the-clock cyber intrusions, many carried out by or at the behest of foreign nation-states.
It's no secret that U.S. government agencies and businesses are the target of around-the-clock cyber intrusions, many carried out by or at the behest of foreign nation-states.
Issues like cybersecurity might keep CIOs up at night, but in Northern New Jersey, at least they know they're not alone.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
It may be difficult to remember now, but not too long ago, cyberattacks rarely made headlines in mainstream news. That's not to say that these advanced persistent threats, sometimes state-sponsored or the product of organized crime, were uncommon. On the contrary, they were booming. It was just that few people liked to talk about them.
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation.
Much of today's cyber crime is supported by bad-actor sites that enable questionable and criminal activities. A look at McColo, ZlKon, HostFresh and other "sinister" players.
Imperva's Amichai Shulman looks at database attack and defense.
Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.
Technology has played a particularly prominent role in the 2008 US elections -- and it isn't just the typical silliness over whether a candidate really claimed to have invented a key piece of technology. Throughout the year we've seen technological advances used both for good, such as using Short Message Service to announce a vice presidential pick, and for bad, such as hacking into another vice presidential pick's private e-mail account. In this story, we'll take a look at the eight techiest moments of the 2008 presidential race, including YouTube debates, viral videos and e-voting controversies.
Richard Clarke gave up his post as President Bush's top advisor on cyberthreats, but he hasn't given up the fight for better IT security.