"Indian providers have had to deal with these contingencies-international telecom cables being sliced, large union strikes that impact workers-so they are generally more prepared to deal with [them]," says Steve Hall, partner with ...
Tags: Indian, telecom cables, outsourcing consultancy, ISG
Public private partnerships are key to the UK’s cyber security strategy, says Cabinet Office minister for political and constitutional reform, Chloe Smith. “We are all in this together. The government recognizes that and ...
Tags: cyber security, constitutional reform, Govnet Cyber Security Summit 2012
The U.S. Senate on Thursday failed to end debate on a comprehensive cybersecurity bill, pushing action on the bill into September and potentially killing it. The Senate voted 52-46 to end debate and move toward a final vote on the revised ...
Tags: U.S.Senate, cybersecurity bill, security
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
The hand of government is not all that heavy on businesses when it comes to notification requirements about data breaches that affect personal information. And it looks like it won't get much heavier, even if a bill sponsored by U.S. Sen. ...
Tags: data breaches, personal information, law, wiggle room
A sophisticated system of video surveillance and advanced sensor integration is now protecting a U.S. Army port. PureTech Systems’ PureActiv wide area video surveillance system has been installed at the Military Ocean Terminal Sunny ...
The International Cyber Security Protection Alliance (ICSPA) has launched an initiative to pool cyber crime intelligence from business, government, law enforcement, security agencies and IT security professionals. Called Project 2020, the ...
Tags: International Cyber Security Protection Alliance, cyber crime
A piece of malware called Mahdi or Madi has been used to spy on hundreds of targets from Iran, Israel and a few other Middle Eastern countries during the past eight months, according to researchers from security vendors Seculert and ...
Tags: malware, Mahdi, Iran, Israel, Middle Eastern countries, computers
Kaspersky Lab has outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year include the continued rise of targeted attacks, cyber-espionage and nation-state ...
Tags: malware, Kaspersky, cyber espionage, cyber
PeakColo,a leading enterprise-class IaaS Cloud service provider to service providers,announced today the addition of its seventh cloud node in Chicago,Illinois.PeakColo will partner with PlusOne,a Chicago-based data center service ...
Tags: IaaS Cloud Service, PeakColo, seventh cloud node in Chicago, PlusOne
Three service providers that use equipment from Huawei have said they will take strong precautions to ensure the security of their networks in response to a congressional report on this week that said carriers should not buy from Huawei or ...
Tags: Congressional, Huawei, security, ZTE
President Obama is exploring the option of using his executive authority to get government agencies and critical infrastructure owners to implement better controls for protecting their computer networks. According to a report by Reuters, ...
Tags: computer networks, White House, executive authority, critical networks
Schneider Electric today announced it has seen 4% growth in the last quarter, as well as 9% in the first nine months of 2012, with infrastructure, buildings, power and IT business units showing the most momentum, during the first day of its ...
Tags: cloud, Cloud growth, energy, Schneider Electric