Security News

Outsmarting grid security threats
2017-10-05 13:00

Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric distribution grids in...

Threat Modeling the Internet of Things: Part 4 - Weak Authentication
2017-10-04 12:20

For the first time, one of the largest cyber security conferences in the ASEAN region, the Singapore Internet CyberSecurity Week (SICW), had a track devoted just to the Internet of Things. One...

The Challenge of Training AI to Detect Unique Threats
2017-10-03 12:22

In a previous column, I discussed how traditional endpoint security fails because it focuses on detecting known bad instances. As evidenced by the rapid rise of email-based attacks, this is a...

Third-Party Risks a Rising Cyber Threat, Research Shows
2017-09-28 12:28

Third-party risk and understanding that risk continues to grow; but mitigation of the risk is, if anything, getting worse. This can be seen in two separate studies published this week by Ponemon...

The Three Pillars of Hypothesis-Driven Threat Defense
2017-09-27 12:09

 There are two possible outcomes: if the result confirms the hypothesis, then you've made a measurement. If the result is contrary to the hypothesis, then you've made a discovery. read more

Sophisticated threats? It’s usually the basic ones that get you
2017-09-26 13:30

To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. Losing sleep over...

US Financial Regulator Launches Unit to Police Cyber-threats
2017-09-26 11:44

The US Securities and Exchange Commission has announced it is setting up a special unit dedicated to identifying cyber-related misconduct. read more

Cyber threat analysis in complex adaptive systems
2017-09-25 14:00

The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare you that in this...

Threat Intelligence and the Power of Attribution
2017-09-20 20:32

Arbor's Paul Bowen on Where Organizations Miss the Mark with Threat IntelMost organizations are good at collecting threat intelligence, but they struggle to operationalize it - and especially to...