cybersecurity

  • Microsoft Ventures backs Illusive Networks, a cybersecurity firm that protects with deception

    Microsoft Ventures backs Illusive Networks, a cybersecurity firm that protects with deception

    Illusive Networks, a cybersecurity startup based out of Israel that protects networks by building “deception” frameworks to identify and trap malicious hackers, is today announcing that it has added Microsoft Ventures — the software giant’s young investment arm — as its newest strategic investor. In keeping with the its name and purpose in this world, Illusive… Read More

  • Recommendations on cyber security for the 45th president… Use more hackers Crunch Network

    Recommendations on cyber security for the 45th president… Use more hackers

    2016 was an extraordinary year. A record number of security breaches affected billions of people worldwide, including cyber attacks that dramatically impacted the course of businesses and governments. The Unites States, the world’s most connected nation, and the rest of the world will face a deficit of 1.5 million cyber professionals over the next  five years whose jobs are essential… Read More

  • Will U.S. sanctions against Russia fix cybersecurity? Crunch Network

    Will U.S. sanctions against Russia fix cybersecurity?

    The United States has finally announced a comprehensive package of responses to Russia’s 2016 influence operation against the U.S. elections. This is a significant response, but a closer reading of the package reveals four important lessons about what this means for deterrence, statecraft and cybersecurity. Read More

  • ForeScout-Splunk integration hopes to bring greater insight to IoT security

    ForeScout-Splunk integration hopes to bring greater insight to IoT security

    ForeScout announced an integration with Splunk today that it hopes will bring a new level of security visibility to Internet of Things devices. The new tool dubbed The ForeScout Extended Module for Splunk, allows two-way communication between the ForeScout CounterACT tool and Splunk Enterprise or Splunk Enterprise Security (Splunk ES) — with the goal of finding issues faster in order… Read More

  • Yahoo shares tumble as investors fear Verizon acquisition trouble

    Yahoo shares tumble as investors fear Verizon acquisition trouble

    Yahoo shares tumbled 6% on Thursday as investors feared that the latest Yahoo hack could spell bad news for its sale to Verizon. This is the second major hack revelation in recent months and there’s speculation that Verizon could be spooked. Some are wondering if Verizon will ask for a discount on the $4.8 billion deal or scrap it altogether. TechCrunch is owned by Verizon, but we do… Read More

  • Is the U.S. no longer tamper-proof? Crunch Network

    Is the U.S. no longer tamper-proof?

    In a year that has proven to have a mind of its own, America received another rattling of the cages just this past weekend, and the implications could not be more distressing. The United States of America’s presidential election and its congressional races were likely tampered with by another country. To what extent those efforts affected the outcome of the election we don’t know… Read More

  • A single typo may have tipped the election

    A single typo may have tipped the election

    Among the many exasperating lapses detailed in the New York Times’ lengthy report on Russia’s apparent interference with the 2016 election, one in particular stands out — the scale of its repercussions matched only by its banality. It seems that the hack of John Podesta’s emails may have been the result of a single typo in an email intended to warn him of the risk. Read More

  • Protecting America’s critical infrastructure must remain a priority Crunch Network

    Protecting America’s critical infrastructure must remain a priority

    America’s dependence on technology and web-based communication has forever changed the way government functions at every level. But it’s not only highly sensitive data and intellectual property that government officials must keep secure; America’s access to drinking water, electricity, transportation networks and countless other types of critical infrastructure are at risk… Read More

  • Buying stolen data Crunch Network

    Buying stolen data

    Should companies buy stolen data from third parties to combat credential reuse attacks against themselves? Herein we discuss the rampant, and quiet, practice of legitimate companies buying stolen data off the dark web. Read More

  • How blockchain can help fight cyberattacks Crunch Network

    How blockchain can help fight cyberattacks

    Imagine a computing platform that would have no single point of failure and would be resilient to the cyberattacks that are making the headlines these days. This is the promise behind blockchain, the distributed ledger that underlies cryptocurrencies like Bitcoin and Ethereum and challenges the traditional server/client paradigm. Read More

  1. 1
  2. 2
  3. ...