In an effort to raise awareness of the roles that all of us play in protecting our digital lives, today, individuals, organizations, and communities throughout the United States are gearing up to promote National Cyber Security Awareness Month (NCSAM). Tens of thousands of NCSAM participants across the country, including Verisign, will be doing their part by posting safety and security tips on social networks, educating their customers and employees, posting tips, holding events, and much more.Read more
POSTS TAGGED: cybersecurity
*Originally published in CSO Magazine
There is a growing consensus within the information security community around the benefits of establishing “intelligence-driven” security operations. A growing number of organizations are moving in this direction, based on the combination of increasingly network-centric operations and the complexity of today’s cyber threats. Without question, integrating intelligence into your security operations is beneficial, provided you are following a few core principles, one of which is working with accurate, deep and relevant intelligence.Read more
There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks.
As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. This incident illustrates the disruptive capability of IPv6 in action and also prompted me to think about what IT professionals need to do to help make sure their network infrastructure is ready for the impending launch of IPv6.Read more
For the past few years, iDefense has highlighted cyber security disruptors in our annual Threats and Trends report. In the commercial world, the notion of a business disruptor centers on ideas or technologies that fundamentally change the way a business sector operates. One example is the combination of iTunes and the iPod. Other companies sold digital music before Apple Inc. came up with this combination at the right price point, but once they did, they fundamentally changed how people purchase music. That is a business disruptor. Similar to business disruptors, a cyber security disruptor is an idea or technology coming down the pipe that will fundamentally change how enterprise security staffs protect their environments. These are technologies that will impact us within the next five to 10 years.Read more
Here’s a new video of me discussing my thoughts on the Zeus malcode, one of the most interesting manifestations in cybersecurity...Read more