Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
Computerworld - A senior Democratic lawmaker is urging President Barack Obama to issue an executive order aimed at protecting the nation's critical infrastructure against cyber threats. In an open letter to the President on Tuesday, Sen. ...
Tags: infrastructure, US, cyber threats, computer network
Public private partnerships are key to the UK’s cyber security strategy, says Cabinet Office minister for political and constitutional reform, Chloe Smith. “We are all in this together. The government recognizes that and ...
Tags: cyber security, constitutional reform, Govnet Cyber Security Summit 2012
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
The European Commission (EC) is considering making it mandatory for companies to report cyber attacks to harness the benefits of open dialogue, says vice-president Neelie Kroes. Despite industry opposition, open discussion about cyber ...
Tags: cyber, European Commission, industry opposition, security strategy
If attackers want to get in to an organisation's information systems, they will, says Frank Coggrave, general manager for Europe at e-discovery firm Guidance Software. "Many IT departments still have their heads in the sand on this issue. ...
Tags: information systems, IT departments, security investments, Software
A perplexing risk has emerged for parents, as kids are drawn into chat rooms, online commerce, and submitting private data to join groups of "friends" they have never met, undermining traditional safety precautions of American families. ...
Tags: risk, online commerce, chat rooms, groups of"friends"
The Democratic Party embraced its version of Internet freedom and called for new cybersecurity legislation in its platform released as the party begins its convention in Charlotte. The Democratic platform, released late Monday, calls for ...
Tags: Democratic Party, Internet freedom, cybersecurity legislation
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
Cyber security and compliance firm LogRhythm has secured $15m investment funding for product innovation and international expansion. The funding round was led by Siemens' Venture Capital group, with participation from existing investors ...
The U.S. government needs a comprehensive doctrine addressing cyber security instead of the current patchwork of policies and agencies dealing with cyber threats, according to a group of experts. The lack of an overarching cyber security ...
Many organisations continue to rely on ineffective intrusion prevention systems (IPS) for defending information systems, says security firm Stonesoft. Advanced evasion techniques (AETs) – which combine several known evasion ...
The world is becoming increasingly connected, so the need for security and privacy is integral to modern society says Raj Samani, vice-president and CTO of McAfee Europe. With everything becoming connected, from smart meters to cars, ...
Tags: security, privacy, McAfee Europe
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed. Almost a third of more than 3,000 IT professionals, including 200 from the UK, polled by security firm ...
American International Group (AIG) has introduced CyberEdge business risk and insurance cover in the Middle East to negate the threat of cyber-attack to a company. AIG MEA Region Professional Indemnity head Juliette Pettit said, ...
Tags: AIG, CyberEdge business risk, insurance, Middle East, cyber attack