Network security suffers from lack of innovation, IPS pioneer says
Dennis Cox, co-founder of BreakingPoint and formerly with TippingPoint, says IDS and IPS have become commodities and have gone stale while threats against the network continue to evolve.
Google-NSA partnership should be more public, less private
We need better public-private partnerships to secure cyberspace, but if these partnerships are to serve the public interest, they must be as public as they are private.
Security Jam wants bread-and-butter proposals
Security Jam, powered by IBM, has brought thousands of participants together to discuss the challenges of cybersecurity; step two is getting concrete proposals.
Microsoft's Tuesday patch will be a Windows wash
In the past six months, Patch Tuesdays have seemed more like "Fat Tuesdays," at least in terms of the volume of fixes contained in the monthly patch.
Microsoft warns of IE bug on Windows XP
Internet Explorer continues to be a target of unpatched exploits as Microsoft released yet another security advisory for IE, mostly applying to Windows XP users.
IBM 'jam' technology goes global
The Security Jam uses an IBM platform to bring together thousands of participants eager to take on cybersecurity.
Dell strikes alliance to simplify network security
Government agencies dependent on multiple networks to separate sensitive information are likely benefit from a new alliance between Dell and Integrity Global Security.
Cyber threat growing at unprecedented rate, intell chief says
Director of National Intelligence Dennis Blair today gave a blunt assessment of the many cyber threats faced by U.S. government and private-sector networks.
Spyrus to offer 'secure' portable Windows OS
The new Spyrus Hydra PC secure pocket drive for Windows PCs will be available on March 1, according to company officials. The device can be plugged into any laptop or desktop PC, enabling storage and backup operations.
Virtual border fence would lose under budget
The administration wants $43.59 billion for the Homeland Security Department in fiscal 2011 compared with the $42.60 billion that the department got for this year.
Faster networks, closer inspection fend off agile threats
Securing IT systems now means continuously monitoring the status of those systems on the back end and closely inspecting the traffic moving through networks on the front end to provide real-time situational awareness.
Evolving guidelines seek to harmonize IT security for government systems
NIST, the Defense Department and the intelligence community are getting in step as a joint task force brings order to IT security requirements across government.
Intrusion protection systems: Buyer beware
A head-to-head test of IPS from major vendors found that performance often is overstated and users must tune the systems to get effective results.
A new wrinkle in Nigerian e-mail scams
For just a small fee, you too can have an opportunity to retrieve Nigerian funds belonging to the alleged Christmas Day bomber.
DARPA: Calling all cyber geneticists
A DARPA research program would combine technologies to apply genetics, anthropology, sociology and physiology to the identification of cyberattackers.
New cybersecurity coordinator says he has the president’s ear
In his first public talk since taking the job, Howard Schmidt seeks to allay concerns about his influence in the White House.
Online threats continue to outpace government and industry’s ability to respond
A new study on the security of the world’s critical infrastructure show that cyber threats are getting worse, but bureaucracy and distrust continue to hamper the ability of government and industry to cooperate in countering them.
NIST approves an additional mode for using encryption standard
The new publication recommending the use of XTS-AES mode of encryption for securing stored data is the latest in a series of recommendations for modes of operation of symmetric key block ciphers.
Nation's toughest personal info law about to take effect
A Massachusetts law set to go into effect March 1 requires strong encryption, firewalls and antivirus protection in addition to a written security plan for all organizations that hold personal information on state residents.
New threats compel DOD to rethink cyber strategy
The Defense Department's diversity remains its Achilles' heel in the race to improve information assurance.
Do Not Sell My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
Manage Consent Preferences
Strictly Necessary Cookies - Always Active
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data, Targeting & Social Media Cookies
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.
Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
Strictly Necessary Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Functional Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Performance Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Social Media Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Targeting Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Help us tailor content specifically for you: