The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to go because of the collateral damage it would do to privacy and the security of communications systems.
Stories by Tim Greene
A team from Google’s fraud-detection group has started up its own software as a service venture for spotting transaction fraud quickly based on rule sets but that also learns as it goes to improve its hit rate.
The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.
Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do, Security BSides Boston conference was told.
The Department of Homeland Security has issued an alert about a six-year-old SAP vulnerability that’s still being exploited enough that DHS deems it worthy of special note.
When the ransomware demands come in it’s really too late to come up with a good response plan, so do that as soon as you can, an Interop audience was told.
Cyber insurance can pay out millions to cover the cost of data breach liability, but buying the policies can be a nightmare for info security pros, and premiums for similar coverage can vary wildly.
Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the big Interop conference in Las Vegas his list of a dozen mostly free “killer” tools.
Terrorists are developing and distributing encryption tools that protect privacy of their communications, and other apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.
The Interop conference convening this week will be a far cry from the gathering of a small group of technology pioneers who sought interoperability among Internet devices 30 years ago.
Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.
Fortinet is embarking on a mission for its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.
Goal is rapid discovery of attacks and creating defenses against them. Recently Network World spoke about the hurdles left to get over with Palo Alto’s CSO Rick Howard.
The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.
Questions and answers about first draft of how to deal with law enforcement’s need to access encrypted information
- DevOps Software Configuration Manager ACT
- DevOps Engineer NSW
- Security Clearances Vetting Services Officer ACT
- Data Feeds Developer | Financial Services | C# & SQL NSW
- Data Engineers NSW
- Implementation / Deployment Specialist- Web Sphere, ESB, IIB NSW
- Senior IT Security Specialist-SANS, ISC2, ISACA, ITIL NSW
- Systems Engineer - Wintel, VMWare and Citrix NSW
- Microsoft System Engineer - NV1 ACT
- Data Center Architect NSW
- F5 Security Hub NEW Look - Try us out today
- APJ businesses think they will be breached: Here's why: Read the article NOW
- Hear from those who have been there, done it and transformed their business for the better with AWS Cloud. View their stories and other informative AWS sessions On-Demand.
- NEW Gigamon Transform Security Zone - Find out more now!
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.