cybersecurity

  • Cybersecurity is threatening America’s military supremacy Crunch Network

    Cybersecurity is threatening America’s military supremacy

    The sparsely populated Spratly Islands are quickly becoming the center of one of the most contentious international disputes between world powers since the fall of the Soviet Union. Alarmingly, the use of cyber attacks suggests we might already be in the midst of a new Cold War playing out in cyberspace — where America’s advantage is not as clear as it is with conventional armies… Read More

  • Hacking for investor profit Crunch Network

    Hacking for investor profit

    Just over four years ago, I sat through what still is the most viscerally disturbing information security talk I’ve ever seen. The late Barnaby Jack, a brilliant security researcher, had just demonstrated in front of 300 people how he could wirelessly take control of an Implantable Cardioverter Defibrillator and cause it to discharge enough electricity to jump a 12 mm spark gap. Read More

  • Just how vulnerable is election technology? Crunch Network

    Just how vulnerable is election technology?

    This year’s electoral process has been unconventional, to say the least. As this volatile election approaches, citizens are skeptical about whether our electoral system — particularly the technology used in it — is precise, unbiased or secure enough to produce a fair, accurate vote count. But just how vulnerable is our election technology? Read More

  • The emerging Darwinian approach to analytics and augmented intelligence Crunch Network

    The emerging Darwinian approach to analytics and augmented intelligence

    Much has been made about the business implications of recent, rapid advancements in cognitive computing — that is, the possibility of advanced analytics tools to help human knowledge workers glean actionable insight from vast and deep lakes of historical, transactional and machine-generated information. Read More

  • What if cybersecurity followed physics? Crunch Network

    What if cybersecurity followed physics?

    The first cybersecurity unicorn kernel popped in late 2013 with the announcement of CloudFlare’s $50 million Series C investment. Today, 10 privately held companies hold membership in the ultra-exclusive cybersecurity unicorn club. With the addition of each new member, eyebrows are raised and questions are asked. Are cybersecurity unicorns outliers or are we at the start of a… Read More

  • How connected cars are turning into revenue-generating machines Crunch Network

    How connected cars are turning into revenue-generating machines

    History repeats herself, but she mumbles. Most of the time we can only in retrospect discern what she was trying to say. Sometimes, though, history’s intent is clear. That’s where we stand with the state of connected cars: History is repeating itself. There is a correspondence in the patterns of disruption when you compare the future of connected cars to the past of the… Read More

  • How data science fights modern insider threats Crunch Network

    How data science fights modern insider threats

    Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports, whitepapers and surveys — and these insider threats are becoming increasingly more difficult to detect and prevent, as well as more frequent. Read More

  • Exploits patched by Apple today hint at years of surreptitious government hacks

    Exploits patched by Apple today hint at years of surreptitious government hacks

    You’ll want to be updating your iOS devices to 9.3.5, the version released today by Apple — especially if you’re a prominent human rights activist. A recently thwarted attack on just such a person employed not one but three zero-day exploits. And that’s just the beginning of the story. Read More

  • The biggest threat facing connected autonomous vehicles is cybersecurity Crunch Network

    The biggest threat facing connected autonomous vehicles is cybersecurity

    Connected, autonomous vehicles are around the corner. Many of the most innovative and deep-pocketed companies in the world are racing to bring them to market — and for good reason: the economic and social gains they will generate will be tremendous. But any transformative technology creates new challenges and risks in addition to benefits. This is no exception. Read More

  • How to prevent your IoT devices from being forced into botnet bondage Crunch Network

    How to prevent your IoT devices from being forced into botnet bondage

    With more and more unguarded IoT devices becoming connected to the internet every day, malicious bot lords are having an easier time conscripting new recruits into their undyingly loyal armies of zombie machines — and their next target can be your smart fridge, light bulb, kettle or door lock. Here’s what you need to know about IoT botnets and what can be done to fight this… Read More

  • Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

    Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

    The 2016 DARPA Cyber Grand Challenge has concluded, and the winning team — Carnegie Mellon University’s ForAllSecure — is taking home the $2 million grand prize. What’s that you say — what’s the Cyber Grand Challenge? I’m glad you asked! Read More

  1. 1
  2. 2
  3. ...