A lot has been said about how technology is changing and the impact that is having on the way businesses operate and the way we live our lives. We're more mobile, we have the world's information available to us at the click of a button and our data is stored on interconnected servers spread throughout the world.
Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.
I have no idea whether he is racist, though I suspect he isn't. Intended or not, ill-used words do cause damage but it is the presence or absence of hateful intent behind such remarks rather than the words used that define the mindset of the speaker. We can't read minds so we interpret that intent, by proxy, from people's words...
The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.
2013 was a year in which big data became a 'hot topic' for discussion and debate, reaching far beyond the usual industry journals and making the mainstream news for a number of good and bad reasons. With that in mind there has been a great deal of speculation about what trends we should expect to see in big data in 2014.
Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.