Posted on 17 April 2014. | Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.
Posted on 17 April 2014. | More effective collaboration between government and the infosec industry is crucial to protecting organizations from cyber threats. More work needs to be done to strengthen government’s position as a source of information on potential threats.
Posted on 16 April 2014. | A new study exposes a severe gap in security visibility between C-level executives and IT security staff. 60% of IT security staff are informing executives of specific risks only when the risk is deemed serious, or not at all – and in more than half of the cases, actively omitting negative facts.
Posted on 14 April 2014. | Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future threats.