Security

  • Edward Snowden Supports Apple’s Public Stance On Privacy

    Edward Snowden Supports Apple’s Public Stance On Privacy

    Edward Snowden says we should support Apple’s newly emphasized commitment to privacy rather than a business model driven by personal data collection, whether or not Tim Cook is being genuine. Snowden spoke over video conference during the Challenge.rs conference in Barcelona today. I asked Snowden his thoughts on Cook’s recent acceptance speech for an Electronic Privacy… Read More

  • Google Launches Bug Bounty Program For Android With Rewards Up To $38,000

    Google Launches Bug Bounty Program For Android With Rewards Up To $38,000

    Google today announced the launch of a security rewards program for Android at Black Hat’s Mobile Security Summit in London. The Android program will only cover vulnerabilities that affect Nexus phone and tablets available for sale in the Google Play Store, though. Right now, that’s the Nexus 6 phone and Nexus 9 tablet. Read More

  • Standards Bring Order To Enterprise Software

    Standards Bring Order To Enterprise Software

    One thing was clear to me this week as I wandered the halls of the Hilton at Torrey Pines for the Cloud Identity Summit, and it had nothing to do with the famous golf course or the trees for which it’s named. Whatever the subject, enterprise scale brings with it complexity, and one of the ways to counteract that complexity is developing standards. In fact, a persistent theme across… Read More

  • What The U.K. Surveillance Powers Review Says On Encryption And Hacking

    What The U.K. Surveillance Powers Review Says On Encryption And Hacking

    A U.K. review of state surveillance capabilities takes the view that more widespread use of strong encryption within the technology industry ultimately sanctions government agencies conducting mass surveillance — and even hacking activities — as “ingenious or intrusive” workarounds to get at information that’s otherwise locked out of reach. Read More

  • The Enterprise Silo Problem Stubbornly Persists

    The Enterprise Silo Problem Stubbornly Persists

    I’ve been writing about the enterprise for a long time, and back in the day when I was covering content management, there was forever talk about busting down content silos and putting the content to work across the company. It was a nice idea, but in practice it rarely happens. What I learned this week, as I attended the Cloud Identity Summit in San Diego, was that identity was also… Read More

  • The Wikimedia Foundation Turns On HTTPS By Default Across All Sites, Including Wikipedia

    The Wikimedia Foundation Turns On HTTPS By Default Across All Sites, Including Wikipedia

    The Wikimedia Foundation, which runs Wikipedia and a number of other wiki-based projects, announced this morning that it’s now implementing HTTPS by default across all its sites in order to encrypt its traffic. The decision, it says, will make it harder for governments and other third parties to monitor users’ traffic, and will make it more difficult for Internet Service… Read More

  • Breathalyzers, Selfies And Body Sweat? A Wallet Password Replacement Showdown Crunch Network

    Breathalyzers, Selfies And Body Sweat? A Wallet Password Replacement Showdown

    If you hate typing long passwords into super small screens, I have good news: smart people are trying to fix the problem. Yes, the whole rigmarole of creating a word that has at least one capital letter, one number and one special character could soon be history. For the mobile payment industry, this is exciting news because people won’t use mobile wallets if they have to enter a… Read More

  • Security Startup Illusive Networks Uses Deception To Catch Hackers

    Security Startup Illusive Networks Uses Deception To Catch Hackers

    Imagine you’re a red-blooded hacker and you want to break into a corporate network. You find your way in, probably by stealing someone’s credentials. Then you go to work. You move around until you find another lock to pick and slowly, steadily, patiently you go deeper and deeper into the network until you find the prize you’re seeking. But what if that picked lock the… Read More

  • New Ping Identity Platform Includes Apple Watch Authentication

    New Ping Identity Platform Includes Apple Watch Authentication

    Ping Identity announced a platform approach to identity management today at the Cloud Identity Summit in San Diego that includes the ability to get your second authentication factor using an Apple Watch. The idea behind the platform is to put identity at the center of the security model and enable users — whether employees, partners or customers — to have access to applications… Read More

  • Menlo Security Emerges From Stealth With $25M And Plan To Defeat Malware

    Menlo Security Emerges From Stealth With $25M And Plan To Defeat Malware

    Menlo Security, a company with a unique plan to battle malware, emerged from stealth today and also announced $25M in Series B funding. The idea is an intriguing one. Many security problems emanate from malware, which can give hackers a path into a system where they can find their way deeper in and eventually compromise the entire network. But what if you could prevent the malware from… Read More

  • The Horizon For Information Security Jobs Crunch Network

    The Horizon For Information Security Jobs

    With graduation season upon us, many graduates entering the workforce are understandably anxious about their future employment. However, at least one group is poised to take advantage of a market suffering from a massive skills shortage: cybersecurity professionals. Read More

  1. 1
  2. 2
  3. ...