“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” - Abraham Maslow, The Psychology of Science, 1966. But using firewalls to protect against DDoS attacks has its limitations.
When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.
Recent news headlines have declared the password dead. But what's slated to replace it? Are all consumers comfortable with the same authentication methods? Different generations aside, one thing's certain: there's got to be a better way.
There are plenty of security solutions designed to secure the fences that are the first line of defense in most organizations, but what about the threat from within? Expert Ameesh Divatia looks at why insider threats are the next big security challenge.
At this point, it should seem clear we are losing the cyber war. Digital security is getting worse because of lock-in. So how is this impacting our security posture? Jamison Utter explains.
We are now in the wake of two of the biggest and most catastrophic Distributed Denial of Service (DDoS) attacks that we have seen yet. As we have observed, the Internet of Things (IoT) are beginning to pose a real threat to our information security.