In-brief: In a world where billions of devices, users and applications can come and go freely, how do you make sure that the threat protection defenses you have in place are working properly to protect your environment?
Search Results for "critical infrastructure"
OpenSSL Issuing Fixes for High Severity Flaws on Thursday
In-brief: The OpenSSL Project is publishing software updates to address a range of security flaws, at least one of them rated “critical.” The update comes amid a comprehensive audit of the OpenSSL code.
Verizon: 5 Billion Business IoT Connections by 2020
In-brief: A report by Verizon finds business adoption of IoT is growing quickly, boosting that company’s Internet of Things numbers. But increased business adoption of IoT brings risks to privacy and security.
Why Network Segmentation is Imperative on the Internet of Things
In-brief: adoption of Internet of Things technologies puts a premium on the use of network segmentation to ensure connected devices don’t undermine the overall security of the network, according to Cisco’s Scott Harrell.
N.S.A. Breached North Korean Networks Before Sony Attack – NY Times
The New York Times claims that the U.S. National Security Agency used intelligence gleaned from a clandestine operation to compromise North Korea’s cyber warfare unit to pin the blame for the Sony Pictures Entertainment hack on the reclusive Communist country. According to the story by David Sanger and Martin Fackler, the Obama Administration’s decision to quickly blame the hack on the DPRK grew out of a four year-old National Security Agency (NSA) program that compromise Chinese networks that connect North Korea to the outside world. The classified NSA program eventually placed malware that could track the internal workings of the computers and networks used by the North’s hackers and under the control of the Reconnaissance General Bureau, the North Korean intelligence unit, and Bureau 121, the North’s hacking unit, which mostly operates out of China. It has long been recognized that North Korea, which lacks a mature information technology infrastructure, does much of […]