Business Should Move to an Incident Response Security Posture and Accept that Governments Will Maintain Stockpiles of Zero-days
With surprising concurrency, the RAND Corporation has published a lengthy study into zero-day exploits stockpiled by government just two days after WikiLeaks released its batch of documents on CIA hacking tools. While many have been surprised and even appalled that the government should maintain a stockpile of zero-day vulnerabilities and exploits, RAND seems to accept it as a matter of fact that all governments do so.
For the purpose of its research, “RAND obtained rare access to a dataset of information about zero-day software [...]
According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence.
Experts believe sophisticated threat groups could be particularly interested in sectors such as aerospace and defense, energy, health and pharmaceuticals, and shipping.
Threat actors targeted Nordic countries due to their robust economies and valuable information managed by companies operating in sectors [...]
New quantum cryptology research could result in systems that are impossible to hack. But good luck trying to explain it to your boss.
Untangling hyper-entangled twisted light.
Photons in the form of a bi-photon frequency comb.
Quantum-powered random numbers generated by an entropy engine that exploits quantum mechanics.
Quantum cryptology may be the hottest topic in security these days, but it sure reads like a lot of sci-fi jargon. But what does it mean?
Bruce Potter, CTO of the KEYW Corporation, defined it to a room full of privacy professionals this past July at the Black Hat conference. He explained that with so much concern regarding the [...]
From the Heartbleed bug that plagued our social networks, to the recent attacks on Amazon and Sony Pictures, 2014 was truly the year of the cybercriminal.
As the publicity surrounding cybercrime has increased, enterprise IT was forced to up its game. With a renewed focus on security, organisations have rewritten their policies, enhanced their encryptions and upped their anti-virus investments.
Yet despite these efforts, there remains one area of enterprise IT that is frequently left unchecked and underappreciated: businesses’ application portfolios.
With more platforms, updates and apps, the odds of an application security breach have increased year on year. Now, [...]
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.