• New solution helps thwart “smash-and-grab” credential theft

    Of the data breaches investigated in 2011, servers were among the primary target assets in 64 percent of investigations and those accounted for 94 percent of compromised records; a new solution from RSA scrambles, randomizes, and splits authentication credentials across multiple servers, data centers, and the cloud

  • New NIST publication provides guidance for computer security risk assessments

    The National Institute of Standards and Technology (NIST) has released a final version of its risk assessment guidelines which can provide senior leaders and executives with the information they need to understand and make decisions about their organization’s current information security risks and information technology infrastructures

  • New study probes insider threat in financial services sector

    New study found that those committing insider fraud are taking a “low and slow” approach, escaping detection for long periods of time and costing targeted organizations an average of $382,000 or more, depending on how long the crime goes undetected; managers and accountants cause the most damage from insider fraud and evade detection longer

  • Mobile device necessitate “stateless” IT security architecture

    I n a new report, Forrester analysts say that to stay ahead of evolving mobile business requirements, security and risk (S&R) and infrastructure and operations (I&O) executives cannot rely on the old approach of end-to-end control over the data path, device, and applications; instead, they must embrace a “stateless” architecture in which IT decouples security controls from the devices and the infrastructure, derives trust dynamically, and avoids costly new investment of in-house applications and infrastructure

  • view counter
  • Malware intelligence system allow organizations to share threat information

    As malware threats expand into new domains and increasingly focus on industrial espionage, researchers are launching a new tool to help battle the threats: a malware intelligence system which will help corporate and government security officials share information about the attacks they are fighting

  • How govt. can achieve IT savings, innovation

    Innovative shifts in technology can springboard government into a new era of efficiency, effectiveness, and transparency;  lawmakers urged to focus not only on technology infrastructure to achieve savings and efficiencies, but also consider how the government procures and delivers

  • view counter
  • SAIC Launches Inaugural Utah Cyber Defense Challenge and Symposium 2012

    SAIC will lead a Utah statewide cyber competition and symposium designed to raise cyber awareness across government, academia, and industry; the Utah Cyber Defense Challenge and Symposium (UCDC) 2012, to be held 1 June

  • Execs offered cyber security degree track at NYU-Poly

    Polytechnic Institute of New York University says that because defending institutional data against attack depends equally on cyber security experts as well as executives who command management and technical skills, it is introducing a management track to its master’s degree in cyber security; first classes begin this summer

  • Number, diversity of targeted cyberattacks increased in 2011

    The number of vulnerabilities decreased by 20 percent in 2011, but the number of malicious attacks leaped by 81 percent in the same period; targeted attacks have spread to organizations of all sizes and types

  • Feds recruit companies to aid in cyberdefense

    The U.S. national security community is intensifying its efforts to enlist the aid of the private security sector in bolstering the U.S. cyberdefenses

  • Companies hiring hackers to harden defenses

    To burglar-proof your home, it is best hire a burglar as a consultant, as he is more likely to find the security vulnerabilities and demonstrate how they can be exploited; following this approach, companies large and small are now hiring hackers to test the companies’ security system vulnerabilities and find ways to harden these systems to withstand intrusion

  • Helping software to help improve software

    The earlier a problem is detected, the easier it can be solved; before implementing complex programs in a time-consuming process, computer scientists also want to know whether they will reach the desired performance

  • Top Nine cyber security trends for 2012

    Imperva, a data security specialist, see nine emergeing cyber security trends in 2012; rise in big data and application DDoS attacks among key concerns; “Hacking, by nature, is a discipline that relies on innovation,” explained Imperva CTO; “Knowing future, potential threats helps security teams fight against the bad guys”

  • Detecting insider threat from massive data sets

    Researchers in a 2-year, $9 million project will create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data — including email, text messages and file transfers — for unusual activity

  • New partnership to promote cybersecurity education

    There will be a need of more than 700,000 new information security professionals in the United States by 2015; the U.S. Bureau of Labor Statistics estimate that there will be 295,000 new IT jobs created in the United States by 2018 — many of which will require cybersecurity expertise; new partnership focuses on cybersecurity training and education