"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
A new intelligence community report to Congress shows how the proliferation of new technologies, such as portable devices that connect to the Internet, will create new espionage opportunities for malicious actors.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when assessing their information security risks today.
Security teams need to look at the controls they have put in place in their organization and question whether they are shifting risky behavior to different areas and perpetuating problems, says Intel CISO Malcolm Harkins.