To improve infrastructure security per the president's executive order, government agencies must build trust with the private security industry.
Researchers discovered unpatched vulnerabilities in radiation monitoring devices (RMDs) that attackers could leverage to breach nuclear power plants.
Cybercrime Without Borders: Bridging Gaps Between Public and Private Sectors to Ensure a Safer Future
Cybercrime affects businesses and government agencies equally, so why shouldn't the public and private sectors collaborate to secure their critical assets?
Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
Security experts expect U.S. infrastructure to suffer a major cyberattack in the next two years, according a survey of recent Black Hat attendees.
The IoT is transforming before our eyes due to increasing regulations, growing demand for security standards and advancements in the telecom industry.
Legacy systems and platforms can pose serious problems for businesses. Consider the security risks that can come with obsolete technology.
A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
Security vulnerabilities have surprisingly long lifetimes, and organizations can use many methods to respond to and prevent infrastructure threats.
In thinking about the full security package in the context of cloud security, you should consider aspects such as mobile security, social media implications and the evolution of your role as a security leader. Security monitoring and SIEM are...