Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.
Stories by Tim Greene
Fortinet is embarking on a mission for its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.
Goal is rapid discovery of attacks and creating defenses against them. Recently Network World spoke about the hurdles left to get over with Palo Alto’s CSO Rick Howard.
The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.
Questions and answers about first draft of how to deal with law enforcement’s need to access encrypted information
The first proposed draft US federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a terrorist in San Bernardino.
PowerShell used as a tool in compound malware attacks is becoming more common, with 38% of all attacks seen by CarbonBlack and its partners involving the native Windows scripting language.
Startup Seceon has joined a growing number of firms focused on quickly analyzing behaviors on corporate network to identify and prioritize threats that ought to be dealt with, cutting down on the manual work required to spot and stop attacks.
The common practice of incorporating existing open source code in new software leaves the product open to unanticipated vulnerabilities that could be exploited by attackers.
The FBI is helping Arkansas prosecutors break into an iPhone and iPad looking for evidence in a murder trial, and it’s without asking Apple for help.
Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation Award in the Computing Sciences.
The U.S. Department of Justice has indicted seven Iranians in connection with cyber attacks on U.S. banks, the New York Stock Exchange, AT&T and a water facility in New York, according to published reports.
If the FBI can crack the terrorists iPhone it gives Congress more time to come up with a thoughtful decision on encryption backdoors and privacy.
A Johns Hopkins team has decrypted iMessage photos by guessing character-by-character the key used to encrypt it, and Apple plans to release a new iOS version today that will fix the flaw.
Bill Gates on Apple v. FBI: A balance has to be made between the needs of investigators and privacy rights
Bill Gates thinks new laws are needed to sort out the encryption conflict going on between law enforcement and tech companies.
- AGILE Training Manager/Coach NSW
- Messaging Engineer NSW
- Senior Project Manager, Software NSW
- Senior Revenue Systems Functional Analyst SA
- PMO Coordinator- Prince2, Project financials NSW
- Data Management & Reporting Development Officer SA
- Infrastructure Engineer - Windows, VMWare, HyperV WA
- Technical Business Analyst - BI NSW
- Microsoft Server Engineer WA
- Contract Analyst Programmer (JAVA/Oracle/Unix) 160509/AP/395 Asia