With the advent of malicious software that can be purchased online and an underground infrastructure that can be used to set off targeted attacks, cyber security threats are becoming more "democratized," and therefore more likely to gain visibility beyond the walls of the data center. That can lead to more enlightened thinking among executive management about investing in security measures, said Research Director Lawrence Pingree during a Gartner security and risk management summit being held in Australia this week.
There are hackers, and then there are victors. Carnegie Mellon University's computer hacking team, the Plaid Parliament of Pwning, has for the second year running taken first place in a Capture the Flag competition at the DEF CON hacker convention.
A University of California Santa Barbara cryptologist has been awarded $499,000 by the National Science Foundation to pursue work related to secret key cryptography.
The National Science Foundation's Secure and Trustworthy Cyberspace program has issued two multi-million dollar awards for multi-institutional projects in cybersecurity.
In preparation for a major event held at its campus, the University of British Columbia Vancouver opted into a new emergency operations and incident management system.
A multi-campus community college in Anaheim, CA has migrated to a new mass communication system to ensure that emergency messages get out in a timely way and through multiple channels efficiently.
Nearly every large organization has experienced some kind of "significant" IT security incident in the last year, such as a phishing attack, compliance policy violation or unsanctioned device or application use. These are some of the findings of a research project done by IDG Connect for ForeScout, a company that sells security products.
Massachusetts Institute of Technology has selected an enterprise endpoint backup system to back up the laptops and desktops of faculty, staff and students.
A technology company in Halifax is testing software that analyzes social media commentary to identify potential risks worth alerting law enforcement and schools about.
Information security in the education segment is becoming more demanding, and as a result the tools and tactics necessary for securing schools is churning. A recent presentation at Gartner's Security & Risk Management Summit laid out 10 "top" technologies and approaches security professionals should consider adding to their security portfolios.