Amidst the increasing security chaos facing individuals and organizations, one of the dominant themes at this year's RSA Conference was the need for information security professionals to do more, bringing order to enterprise IT security as well as by influencing public policy.
Hackers gained unauthorized access to information on the website of India's Ministry of Home Affairs on February 12, prompting authorities to temporarily block it. But is the government well-equipped to prevent other such attacks?
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
Increasingly, security leaders want to migrate from disparate point solutions to integrated security platforms. Kevin Flynn and Ravid Circus of Skybox Security lay out the business and security benefits.
As a veteran security practitioner, Sam Curry of Cybereason is tired of the attackers having the advantage. He wants to see the tables turned, and he believes behavioral analytics just might be the technology to make it happen.
Are there rules in cyberspace? There aren't many, but Microsoft is proposing a "Digital Geneva Convention" that would set some internet norms for countries to help prevent unfair targeting of civilians.
Dan Holden, a cybersecurity researcher and technologist, has just taken on the new role of CTO and intelligence director at the Retail Cyber Intelligence Sharing Center. What top challenges is he addressing?
Gartner's Avivah Litan is just back from a trip to Israel, and she's particularly enthusiastic about the new topic of "offensive defense." What is the concept, and what security controls does it require?
SecureWorks has released its new Cybersecurity Threat Insights Report, and Matt Eberhart, vice president, says the key takeaways are about automation, orchestrations and the evolution of the security operations center.