Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
A new intelligence community report to Congress shows how the proliferation of new technologies, such as portable devices that connect to the Internet, will create new espionage opportunities for malicious actors.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when assessing their information security risks today.
Security teams need to look at the controls they have put in place in their organization and question whether they are shifting risky behavior to different areas and perpetuating problems, says Intel CISO Malcolm Harkins.
Northrop Grumman Cybersecurity Research Consortium's Robert Brammer says IT security researchers should think like Wayne Gretzky, the National Hockey League hall of famer: Skate to where the puck will be.
"Ethical hacking" - is the term an oxymoron, or is it one of today's necessities in the fight against cybercrime? Jay Bavisi, president and co-founder of the EC Council, feels strongly about why we need ethical hackers more today than ever before.