The US government's offensive approach to 'cyberwar' demonstrates that it doesn't understand that strategies and tactics used in the physical world simply don't apply to the online world, according to Tenable Security's security chief.
Latest from Michael Lee
Former McAfee Threat Research vice-president Dmitri Alperovitch has called for greater powers for private companies, saying that they should be allowed to make citizens' arrests and limited retaliatory action against hackers.
Users could be saved from a lot of pain if information security professionals acted like dictators and forced them to patch, update and take precautions, but Google's chief technology advocate has called for a less totalitarian scheme.
Android is widely accepted as being iOS' greatest rival, but, according to Dell SecureWorks security researcher Timothy Vidas, it has a host of issues that have made it a target for malware authors.
Distributed denial-of-service (DDoS) attacks are on the rise, and, according to Earthwave CEO Carlos Minassian, the situation will get worse when the National Broadband Network (NBN) rolls out.
The way in which IT departments have been approaching information security is flawed, according to Juniper Networks senior director and security architect Christopher Hoff, who said that security departments need to adopt automation to free up their time to think outside the box.
The golden age of cybercrime could come to a close as soon as 2014, according to Kaspersky Lab founder Eugene Kaspersky — as long as the world changes how it coordinates on creating laws to govern the internet.
Allowing users to bring their own devices (BYOD) needn't be difficult, even for the government, according to the senior manager for the ACT Government's IT security, Peter Major.
Despite the fact that the industry standard for protecting credit and debit card information doesn't address moving card information to the cloud, it can still be done safely, according to Bridge Point Communications chief information officer Dr David Ross.
Palo Alto Networks has been looking through its customers' logs to uncover what employees are doing on the company network.