NSA technical director: Sharing hacker information isn’t enough, we need a shared response

The nature of cyberthreats aimed at both the U.S. government and private American companies calls for a dramatic shift in how the larger cybersecurity community shares information about hackers and collectively responds to attacks, said Neal Ziring, technical director for the NSA’s Capabilities Directorate. While raising the awareness of what different hackers and foreign intelligence agencies are doing in cyberspace remains essential, Ziring said, it’s simply not enough based on the level of danger and activities occurring today. The next and necessary step is the development of a shared, public-private framework in the U.S. that can roll out software patches and other system updates at “machine speed” to individual researchers, industry and the government as soon as new intelligence become available, according to Ziring and Thomas Donahue, director of research at the Cyber Threat Intelligence Integration Center. They both spoke Thursday at a cybersecurity conference in D.C. “The big thing for […]

The post NSA technical director: Sharing hacker information isn’t enough, we need a shared response appeared first on Cyberscoop.

Continue reading NSA technical director: Sharing hacker information isn’t enough, we need a shared response

NSA technical director: Sharing hacker information isn’t enough, we need a shared response

The nature of cyberthreats aimed at both the U.S. government and private American companies calls for a dramatic shift in how the larger cybersecurity community shares information about hackers and collectively responds to attacks, said Neal Ziring, technical director for the NSA’s Capabilities Directorate. While raising the awareness of what different hackers and foreign intelligence agencies are doing in cyberspace remains essential, Ziring said, it’s simply not enough based on the level of danger and activities occurring today. The next and necessary step is the development of a shared, public-private framework in the U.S. that can roll out software patches and other system updates at “machine speed” to individual researchers, industry and the government as soon as new intelligence become available, according to Ziring and Thomas Donahue, director of research at the Cyber Threat Intelligence Integration Center. They both spoke Thursday at a cybersecurity conference in D.C. “The big thing for […]

The post NSA technical director: Sharing hacker information isn’t enough, we need a shared response appeared first on Cyberscoop.

Continue reading NSA technical director: Sharing hacker information isn’t enough, we need a shared response

Managing Cross-Node Dependencies with Desired State Configuration

Learn how to control timing of Desired State Configuration across nodes using WaitFor resources in this how-to article.

The post Managing Cross-Node Dependencies with Desired State Configuration appeared first on Petri.

Continue reading Managing Cross-Node Dependencies with Desired State Configuration

Trends in Software Defined Data Centers

I recently met with a regional cloud service provider (CSP) that has adopted provisioning on demand as their IT model. They spin up applications on demand, having virtualized most of their infrastructure and have developed tools to automate the provisioning of applications and servers for customers/tenants through a self-service portal.  Rather than build-out and manage […]

The post Trends in Software Defined Data Centers appeared first on Radware Blog.

Continue reading Trends in Software Defined Data Centers

Can you justify your security spend?

In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT operations and cybersecurity working together, as well as the AtomicEye RQ platform. Here’s a transcript of the podcast for your convenience. We’re going to spend some time today talking about cyber risk. Can you give us a brief introduction to yourself and your perspective on cyber … More Continue reading Can you justify your security spend?

Software development teams embrace DevSecOps automation

Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps around the world is evidenced by 67% of survey respondents describing their practices as very mature or of improving maturity. Where traditional development and operations teams see security teams and policies slowing them down (47%), DevOps teams have discovered new ways to integrate security at the speed of development. Only 28% … More Continue reading Software development teams embrace DevSecOps automation

Hybrid IT is becoming a standard enterprise model

Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming a standard enterprise model, but there’s no single playbook to get there. Top motivators Looking at the top motivators to move to hybrid IT by country, Hong Kong, UK and US companies highlighted end-user demand most often, while respondents in France, Singapore and South Africa most often noted cost. … More Continue reading Hybrid IT is becoming a standard enterprise model