contributed

Mobilizing SQL Injection Attacks: Same Pig, New Lipstick?

In-brief: New research from Akamai suggests that attackers are using new methods to carry out and cover up for malicious attacks, among them: harnessing harmless mobile carrier networks to carry out attacks such as SQL injection. 

The Unbalanced Negative Externalities of Cybersecurity

In-Brief: Software and the critical systems it powers are now central to our modern lives. But that very software is under growing threat and require new approaches to address those threats, says Symantec CTO Amit Mital. Successes in the arena of public health may be a guide.

To Secure Modern Networks: Close The Visibility Gap

In-brief: In a world where billions of devices, users and applications can come and go freely, how do you make sure that the threat protection defenses you have in place are working properly to protect your environment?

SMEs Face Advanced Threat Sophistication Gap

In-brief: Cisco Vice President Scott Harrell says that small and mid-sized organizations are in the crosshairs of sophisticated cyber criminals. Unfortunately, such firms often lack the tools and skills to identify and contain such threats.

Datakinesis? IoT Makes The Threat Real

In-brief: The Internet of Things will make “datakinesis” – the impact of data attacks on the physical world – common, says Cisco’s Marc Blackmer.