Dr. William Stallings holds a PhD from M.I.T. in Computer Science. He is an independent consultant and author of numerous textbooks on cybersecurity, computer networking, and computer architecture. He has twelve times received the award for the Best Computer Science and Engineering Textbook of the Year from the Textbook and Academic Authors Association. His
Topic: Network Security
Cyber monitoring: You cannot monitor what you cannot measure. In the world of computer communications, monitoring takes on two distinct forms: performance measuring and monitoring physical parameters, and security monitoring of network traffic and computer processes. Only one of these monitoring approaches work. We examine the failure of security monitoring
Intelligence fuels an organization’s ability to stay ahead of the next threat while enabling the business to make informed decisions. A successful threat intelligence program contextualizes threat data, aligns intelligence with business objectives, and then builds processes to satisfy those objectives. As technology evolves, threat actors will inevitably
Router vendor Linksys has locked user accounts on its Smart WiFi cloud service and is asking users to reset passwords after hackers have been observed hijacking accounts and changing router settings to redirect users to malware sites.
NIST invites comments on Draft Special Publication (SP) 800-207, Zero Trust Architecture, which discusses the core logical components that make up a zero trust architecture (ZTA) network strategy. Zero trust refers to an evolving set of network security paradigms that narrows defenses from wide network perimeters to individuals or small groups of resources.
Earlier this month, the cyber security software and services company Imperva mitigated an attack against one of its clients that exceeded 500 million packets per second. This attack was a SYN flood DDoS and it is the largest DDoS attack by packet volume ever observed.
Google announced that their public Domain Name System (DNS) service now comes with support for the DNS-over-TLS security protocol which wraps DNS queries and answers using the Transport Layer Security (TLS) protocol.
Nandi O. Leslie is a senior principal engineer at Raytheon, serving as a researcher in the Network Science Division at the U.S. Army Research Laboratory. Her research interests are focused on cyber security and resilience quantification and assessments explaining what makes networked devices vulnerable to cyber-attacks—and on using machine learning and other
Dr. Cansever is a Program Manager in the U.S. Army Research Office (ARO), where he guides, evaluates and funds fundamental research on Communications and Hybrid Networks and on Multi-User Network Control. He has a Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign. He is conducting research in the areas of
Dr. Bharat Doshi retired from the US Army Communications-Electronics Research, Development, and Engineering Center (CERDEC), where he was Senior Research Scientist (ST) for Cyber Security. In that role, he developed strategies and techniques for securing current and new generation networks and information systems against all forms of attacks in the cyber