data security

  • Synack Raises $7.5 Million Putting Bounties On IT Security Threats

    Synack Raises $7.5 Million Putting Bounties On IT Security Threats

    Security company Synack has a proposition for the hackers of the world. The Menlo Park, Calif.-based company is putting a bounty out on the network and data security threats a business could face and will pay the best hackers to uncover them. It’s a new approach to the omnipresent issue of how businesses can best secure their data and networks, and one that has netted the company… Read More

  • The New Age Of The Security Startup

    The New Age Of The Security Startup

    Last month Apple disclosed and fixed a massive bug in its operating system that left users’ information exposed to theft; faith in the cryptocurrency Bitcoin is eroding; and revenues at the retailing giant Target fell 46% on a quarterly basis over the Christmas season last year, all because of security breaches. There is no doubt that the profusion of technology designed to make… Read More

  • Microsoft, Facebook, LinkedIn, Google And Yahoo Join Apple In Revealing More On NSA Requests

    Microsoft, Facebook, LinkedIn, Google And Yahoo Join Apple In Revealing More On NSA Requests

    All the big tech companies are opening up a bit more about requests made by the U.S. National Security Agency, with Google, Microsoft, Facebook, Yahoo and LinkedIn detailing new info included in their respective transparency reports today. The new reports now include how many requests for the data of its members it has received from the government, how many total users were affected, and… Read More

  • Is The Government Telling The Truth When It Says Your Data Is Secure?

    Is The Government Telling The Truth When It Says Your Data Is Secure?

    Editor’s note: David Teten is a partner with ff Venture Capital and founder and chairman of Harvard Business School Alumni Angels of Greater New York.  Modern encryption systems are, in theory, exceptionally secure. The Advanced Encryption Standard, for example, is so sophisticated that all known attacks are considered computationally infeasible. It is no surprise then, that the… Read More