cybersecurity

  • How IoT security can benefit from machine learning Crunch Network

    How IoT security can benefit from machine learning

    Computers and mobile devices running rich operating systems have a plethora of security solutions and encryption protocols from which to choose that can protect them against the multitude of threats they face as soon as they become connected to the Internet. Such is not the case with IoT. Read More

  • Digital data and the fine line between you and your government Crunch Network

    Digital data and the fine line between you and your government

    What if the government decided they wanted to see what your device could see and hear? Or gain real-time access to the easily digitized information that surrounds a growing crop of connected devices? The Internet of Things (IoT) is producing reams of data about our daily lives — data that could prove incredibly valuable to law enforcement once they figure out a way to harness it. Read More

  • How to deal with the rising threat of ransomware Crunch Network

    How to deal with the rising threat of ransomware

    Of all the money-making schemes hackers employ, the most prevalent is perhaps ransomware, a malware that is usually delivered through infected email attachments and hacked websites or websites featuring ads. Ransomware encrypts files on a user’s computer and renders them unusable until the victim ransoms the key for a specific amount of money. Read More

  • Making sense of enterprise security Crunch Network

    Making sense of enterprise security

    Until recently, I knew nothing about enterprise security beyond some of the more widely-publicized breaches in the United States. That said, after spending most of 2016 immersed in the space, I’ve come to appreciate just how challenging and broad an issue security has become to enterprises. I’ve also come to believe that our best hope for solving security is by understanding… Read More

  • Obama appoints tech veterans from Microsoft and Uber to cybersecurity commission

    Obama appoints tech veterans from Microsoft and Uber to cybersecurity commission

    President Obama has just released the list of appointees to the Commission on Enhancing National Cybersecurity — and it’s more or less what you’d expect: higher-ups from the big players in tech, plus some academics and the former director of the NSA. Wait, what? Read More

  • Interim guidelines to the Cybersecurity Information Sharing Act Crunch Network

    Interim guidelines to the Cybersecurity Information Sharing Act

    Despite the objections of many privacy advocates and security professionals, the Cybersecurity Information Sharing Act (CISA) is now the law of the land. Slipped into the 2016 federal omnibus spending bill, CISA permits private entities to share information about cyberthreat indicators (CTIs) and defensive measures against cyber attacks, both with each other and with the federal government. Read More

  • Hyping vulnerabilities is no longer helping application security awareness Crunch Network

    Hyping vulnerabilities is no longer helping application security awareness

    I fear that overhyping minor vulnerabilities by branding them, pushing the topic with the media and yes, pre-announcing them will cause people to go numb to these announcements. Read More

  • Uncle Sam wants you… to hack the Pentagon Crunch Network

    Uncle Sam wants you… to hack the Pentagon

    My team, the Defense Digital Service (DDS) exists to bring in the best processes, talent, and technology from the private sector into the DoD. An offshoot from the United States Digital Service (USDS) at the White House, we’re tasked with transforming how the Pentagon builds and delivers digital services and products to three million civilian and military employees in the U.S. and around… Read More

  • From the streets to The Street Crunch Network

    From the streets to The Street

    The past several months have brought a string of terror attacks and violent incidents, which not only claim lives but cause worldwide feelings of fear and vulnerability. It seems that groups of terrorists like ISIS can strike when and where they want. As the authorities ramp up surveillance, such attackers simply adapt and change their tactics. They have learned to be patient and to leave… Read More

  1. 1
  2. 2
  3. ...