Why Email Is Worth Saving
What if an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery were available? It is.
Black Hat & DEF CON: 3 Lessons From A Newbie
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
No End In Sight For Ransomware
The screenlocker Kovter, in particular, has shown sharp growth this year. It masquerades as a law enforcement authority and threatens police action if users don’t pay up.
In Cloud We Trust: A New Model
The solution to the problem of data security in the public cloud will require more than a traditional compliance-driven approach.
All In For The Coming World of 'Things'
At a Black Hat round table, experts discuss the strategies necessary to lock down the Internet of Things, the most game-changing concept in Internet history.
Debugging The Myths Of Heartbleed
Does Heartbleed really wreak havoc without a trace? The media and many technical sites seemed convinced of this, but some of us were skeptical.
Why Patching Makes My Heart Bleed
Heartbleed was a simple mistake that was allowed to propagate through "business as usual" patching cycles and change management. It could easily happen again.
Time To Broaden CompSci Curriculum Beyond STEM
Having a visual arts background may not be the traditional path for a career in infosec, but it’s a skill that makes me no less effective in analyzing malware patterns -- and often faster.
The Hyperconnected World Has Arrived
Yes, the ever-expanding attack surface of the Internet of Things is overwhelming. But next-gen security leaders gathered at Black Hat are up to the challenge.
Is IT The New Boss Of Video Surveillance?
IT’s participation in the security of corporate video surveillance is growing, much to the chagrin of the physical security team. Here’s why corporate infosec needs to pay attention.
Weak Password Advice From Microsoft
Tempting as it may seem to do away with strong passwords for low-risk websites, password reuse is still a significant threat to both users and business.