Stories by Tim Greene

Digital Guardian buys Code Green to gain data-loss prevention tech

Endpoint security vendor Digital Guardian has bought Code Green Networks, which makes data loss prevention appliances for businesses.

Report: US retailer Target failed to execute security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.

By Tim Greene | 01 October, 2015 20:21

Tags: Target, data breaches

ZingBox: Startup brings Cisco, Stanford pedigree to IoT security

ZingBox, an Internet of Things security startup whose founders have ties to Cisco and Stanford University, is working on software that guards IoT devices from threats on the Internet.

Datiphy tracks what data is up to for security, auditing purposes

Datiphy, a service provider founded in Taiwan, has bundled up its technology for sale as a software package to make inroads in the U.S. as a security/data auditing tool that detects and reports suspicious access to databases.

OPM breach: 4.5 million more individuals open to future fingerprint abuse

Now the Office of Personnel Management says the number of individuals whose fingerprints were stolen is 5.6 million – up from 1.1 million – and that they can look forward to having those prints misused as criminals get better at exploiting them.

Under DDoS attack? Look for something worse

When businesses are hit by noticeable DDoS attacks, three-quarters of the time those attacks are accompanied by another security incident, according to Kaspersky Lab.

By Tim Greene | 17 September, 2015 23:32

Tags: ddos

Malware enables cheating at online poker

Online poker malware lets players cheat by getting a peek at cards held by opponents whose machines have been infected.

By Tim Greene | 17 September, 2015 23:00

Tags: malware

Obama advisors: Encryption backdoors would hurt cybersecurity, net infrastructure vendors

Making encryption backdoors available to law enforcement would be bad for cybersecurity in general and hurt vendors that make encryption gear, a presidential advisory group says.

SYNful Knock router exploit isn’t going away soon

The SYNful Knock compromise of routers can implant software that creates backdoors to let attackers return over and over, a sophisticated endeavor that demonstrates the ingenuity of its creators, according to a member of the team that discovered the attack in the wild.

Attackers can take over Cisco routers; other routers at risk, too

Attackers have successfully implanted altered versions of firmware into 14 Cisco routers in India, Mexico, the Philippines and Ukraine, according to FireEye, that gives them full access to the devices, and researchers expect compromised machines to show up in more places in other routers.

Experts to IoT makers: Bake in security

Makers of Internet of things devices need to incorporate security into them during the design phase in order to make them less of a threat when connected to networks, according to advice given to them at an IoT security forum.

Cisco security chief: 4 things CISOs need to survive

Cisco’s security consulting chief James Mobley outlines four areas CISOs need to develop their skills in order to keep up with the rapidly changing needs of corporate security.

By Tim Greene | 03 September, 2015 18:33

Tags: cisco

Check Point’s SandBlast sandbox spells R.I.P for ROP attacks

Check Point is upgrading its sandboxing technology so it catches attacks earlier in the process and makes it harder for adversaries to evade detection.

By Tim Greene | 02 September, 2015 17:02

Tags: check point

Attivo brings deception technology to Amazon Web Services

Attivo Networks has upgraded its deception technology so businesses can deploy it within Amazon Web Services cloud to lure attackers to what looks like legitimate physical and virtual machines in order to find out what they are up to.

By Tim Greene | 31 August, 2015 22:03


Dell Oro Group: Check Point, Fortinet, Palo Alto making gains in security appliances

There’s a shift among the top security vendors that has Cisco remaining at the top of the heap but with Check Point Software, Fortinet and Palo Alto Networks making gains and pressuring Juniper Networks, according to new research from Dell’Oro Group.

By Tim Greene | 26 August, 2015 01:12

Tags: check point

Top Whitepapers

Featured Whitepapers