WASHINGTON — China denies it engages in cyberespionage. The U.S. is beginning to float the notion that it’s okay to retaliate aggressively against cyberspies. And more evidence of intellectual property theft, via the Internet, is being flushed out daily.
That’s the backdrop as President Obama and Chinese President Xi Jinping both travel to Southern California’s Rancho Mirage on Friday and Saturday for historic face-to-face meetings.
High on the agenda for discussion: cybersecurity.
China has been widely linked to network break-ins of numerous …More
SEATTLE – The surge of investments in cybersecurity technologies continues. The latest manifestation: Deloitte on Thursday announced the acquisition of cyber monitoring and threat intelligence provider Vigilant.
So now a consulting giant has joined venture capitalists and equity firms in placing big bets in the cybersecurity space. Last Watchdog asked Ed Powers, head of Deloitte’s security and privacy consulting practice, to elaborate on why a consulting firm wants to get its hands dirty actually supplying technology …More
Triple sources of cash infuse security gold rush
May 24, 2013
SEATTLE – Champagne corks popped at Allegis Capital this week as the Silicon Valley venture firm announced what it describes as the “highly profitable” sale of Solera Networks to network security firm Blue Coat Systems in an all-cash transaction.
Meanwhile, the principals at Vista Equity Partners were equally tickled to shell out about $1 billion to acquire messaging and data security vendor Websense, and take it private.
(Editor’s note: Formed in 2008, the Cloud Security Alliance is a not-for-profit coalition of senior executives and cybersecurity experts formed to promote the use of best security practices for cloud computing. CSA members who contributed to this essay include: Dave Cullinane, CISO, eBay; Alan Boehme, Chief of Enterprise Architecture, Coca-Cola; Paul Kurtz, former member of the White House Security Council; Jerry Archer, EVP and CSO for Sallie Mae; Nils Puhlmann, former CSO, Zynga.In this guest essay. CSA executive director, …More
A new guidebook for defending networks
May 15, 2013
Responding to targeted cyberattacks, a new guidebook chock full of advice on how to effectively defend corporate networks against cutting-edge threats, was released this morning by consultancy Ernst & Young and ISACA, the global organization if IT professionals.
“This book fills a gap for employees who manage IT security and risk” said Marios Damianides, past international president of ISACA and a partner at Ernst & Young. “There are only a few books that provide a practical roadmap for waging the …More
Seven tips for using social media safely
May 14, 2013
(Editor’s note: In this guest essay, Julie Myher, editor of NextAdvisor.com, examines how safe it really is – or isn’t– for you to be sharing your personal identity and private information on social media.)
By Julie Myhre
Ravi Bhatia of Highly Relevant in Los Angeles opines that the only way to truly protect your identity on social media is to not use it. That said, here are seven ways to protect your identity on social media:
Keep your personal information private: It …Morekeep looking »