China will investigate providers of IT products and services to protect “national security” and “economic and social development,” according to the official Xinhua news agency. This move follows the U.S. government charged five Chinese military officers with hacking U.S. companies to steal trade secrets.
U.S. Representative Mike Rogers (R-MI) is hard at work in Washington D.C., despite Congressional recess, when other lawmakers have returned to their respective districts and even the President and his family escape the heat to a vacation destination.
Through a malicious code infecting audio-visual conferencing equipment, a group of sophisticated hackers based out of Beijing might be listening in on high-level boardroom meetings, Dell's SecureWorks researchers report.
While some have condemned U.S. National Security Agency monitoring activity, as described by fugitive Edward Snowdon, a bigger, real threat centers on intellectual property theft with America and its corporations most often the target.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!