Stories by Tim Greene

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

By Tim Greene | 01 July, 2015 08:41

Tags: tech hive, robots, retail, slideshow, robotics

FIDO two-factor authentication goes wireless

Expect vendors soon to introduce devices with three forms of wireless support to Fast Identity Online (FIDO) two-factor authentication.

By Tim Greene | 01 July, 2015 01:09

Tags: FIDO Alliance, security, mobile security

Cisco to buy OpenDNS to boost Security Everywhere initiative

Cisco is acting quickly on its new Security Everywhere initiative with the announcement that it plans to buy Internet security service provider OpenDNS for $635 million in cash plus other considerations.

By Tim Greene | 01 July, 2015 00:57

Tags: OpenDNS, M&A, security, beca, Network World

Startup Barkly touts light, fast endpoint protection

Barkly, a startup in endpoint security, has now banked enough investment money to keep it going for two more years and plans to launch its first products sometime in late 2015.

By Tim Greene | 25 June, 2015 05:24

Tags: Cylance, CrowdStrike, security, Bit9, FireEye, Tanium

Study: Cyber risks overshadow corporate board security confidence

Directors of U.S. businesses are pretty confident they can understand corporate security risks, but corporate security pros are not so sure their boards really get it, according to a survey of both board members and C-level security executives.

By Tim Greene | 24 June, 2015 04:23

Tags: Fidelis, security, Ponemon Institute, CSO

7 things to do when your business is hacked

The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.

By Tim Greene | 22 June, 2015 20:29

Tags: data breaches, Rapid7, security, fbi

Startup touts safe sharing of Office 365 documents

Startup Vera promises to secure Microsoft Office 365 documents no matter where they go using policies set by the businesses that create them.

By Tim Greene | 18 June, 2015 01:14

Tags: Office 365, Constellation Research, SnapChat, Microsoft, security

Hijacked medical devices can leave networks exposed

Hacked medical devices can pose direct dangers to patients but also serve as lairs from which malware finds its way into medical facilities' networks and persists even after initial attacks have been cleaned up, according to a new report.

By Tim Greene | 16 June, 2015 21:08

Tags: security, beca, TrapX, health care, industry verticals

Startup service proxies Web, email to purge malware

Startup Menlo Security is offering a proxy service designed to take the risk out of Web traffic and email by proxying them and delivering just a rendering of the content.

By Tim Greene | 09 June, 2015 02:42

Tags: security

Intel Security scares ransomware script kiddie out of business

It was a textbook and criminal - software as a service: Grant access to a software kit that makes it easy to lock up the hard drives on victims' PCs, then skim 20% of the take from those who actually use the kit to extort payments.

By Tim Greene | 05 June, 2015 02:14

Tags: Intel security, security, legal, intel, cybercrime

Startup Niara aims to catch stealthy attacks

Startup Niara has come out of stealth to do battle in the growing field of security intelligence and analytics where it detects and correlates anomalous behaviors and assigns confidence scores that indicate whether they should be further investigated as threats.

By Tim Greene | 03 June, 2015 19:56

Tags: security, intel

Startup Cyber adAPT takes on threat detection

Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.

By Tim Greene | 21 May, 2015 22:25

Tags: Cyphort, Defense Advanced Research Projects Agency, security, DARPA, Damballa, Capita

New protocol from Guardtime hopes to unseat RSA for authentication, digital signatures

Data integrity vendor Guardtime hopes its newly announced protocol will replace RSA for the purposes of authentication and digital signatures, touting it as easier to manage and less vulnerable to hacking.

By Tim Greene | 21 May, 2015 10:37

Tags: security, 21, rsa

Should hackers be tolerated to test public systems?

The purported veering of a jetliner caused by an onboard hacker points up a larger problem, experts say airlines and other providers of services may be blind to the value such security researchers can offer in the name of public safety.

By Tim Greene | 20 May, 2015 03:18

Tags: Yahoo, Google, security, Facebook

Startup Ionic Security takes the sweat out of securing documents

Well-funded startup Ionic Security has launched a data-protection service that guards encrypted documents no matter where they go until access is authorized by its policy engine based in the cloud, making it possible to protect data even if the files that contain it fall into the wrong hands.

By Tim Greene | 12 May, 2015 01:12

Tags: security

Top Whitepapers

Featured Whitepapers