Stories by Tim Greene

Black Hat 2015: Cracking just about anything

Researchers at the Black Hat 2015 conference next week will show how to crack Internet routing protocols, malware-detecting honeypots, radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid becoming victims to their new attacks.

Endpoint security firm SentinelOne challenges traditional anti-virus software

Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.

FinalCode keeps files safe wherever they go

Startup FinalCode secures files so permissions that protect them follow them around even when they are accessed outside secured networks.

Next-generation endpoint protection not as easy as it sounds

Rather than looking for signatures of known malware as traditional anti-virus software does, next-generation endpoint protection platforms analyze processes, changes and connections in order to spot activity that indicates foul play and while that approach is better at catching zero-day exploits, issues remain.

Google Capital likes CrowdStrike for endpoint protection

Next-gen endpoint protection vendor CrowdStrike has landed $100 million in new investments to beef up sales and engineering and continue its push to make anti-virus software obsolete.

DEF CON: Come hack the Internet of Things

The Internet of Things is talked about a lot and many people are unsure what it really is, but at DEF CON 23 this summer in Las Vegas, that should become a lot more clear as attendees compete to hack IoT devices.

Bitglass boosts security for data in public-cloud apps

Bitglass has boosted the protection it offers cloud-based applications, now supporting fully searchable AES 256 encryption without degrading the speed of searches.

Law enforcement backdoors open corporate networks to criminals

A panel of distinguished cryptographers says letting law enforcement have access to encrypted communications means more vulnerabilities for criminals to exploit and less secure corporate networks.

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

FIDO two-factor authentication goes wireless

Expect vendors soon to introduce devices with three forms of wireless support to Fast Identity Online (FIDO) two-factor authentication.

Cisco to buy OpenDNS to boost Security Everywhere initiative

Cisco is acting quickly on its new Security Everywhere initiative with the announcement that it plans to buy Internet security service provider OpenDNS for $635 million in cash plus other considerations.

Startup Barkly touts light, fast endpoint protection

Barkly, a startup in endpoint security, has now banked enough investment money to keep it going for two more years and plans to launch its first products sometime in late 2015.

Study: Cyber risks overshadow corporate board security confidence

Directors of U.S. businesses are pretty confident they can understand corporate security risks, but corporate security pros are not so sure their boards really get it, according to a survey of both board members and C-level security executives.

7 things to do when your business is hacked

The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.

Startup touts safe sharing of Office 365 documents

Startup Vera promises to secure Microsoft Office 365 documents no matter where they go using policies set by the businesses that create them.