Stories by Bob Brown

Big bucks going to universities to solve pressing cybersecurity issues

By Bob Brown | 16 April, 2014 03:14

During a week in which everyone seemed to be searching for answers amid revelations of the Heartbleed bug, several universities and their partners announced new efforts to explore IT security advances.

iPhone Air: Latest iPhone 6 concept video has fanboys fired up

By Bob Brown | 11 March, 2014 22:07

With rumors heating up that Apple will announce an iPhone 6 by year-end, concept designers are working their fingers to the bone and YouTube is lighting up with their videos.

Story time: Researchers picture way better password memory scheme

By Bob Brown | 04 December, 2013 17:23

Once upon a time some Carnegie Mellon University researchers came up with a scheme to use stories and pictures to help users live happily ever after by creating and remembering dozens of passwords – and avoiding use of the exact same passwords for multiple sites.

FBI: Beware online shopping scams

By Bob Brown | 27 November, 2013 16:12

The FBI this week issued a series of reminders to online shoppers to beware of scams and to use their common sense.

Cryptolocker: The Musical

By Bob Brown | 22 November, 2013 00:17

Everyone's looking for a fresh spin on Cryptolocker, the maddening ransomware that has become more prominent in recent days, and Umbrella Security Labs has come up with one: A 3D visualization set to music.

FireEye, Palo Alto top network companies on Deloitte Fast 500 list

By Bob Brown | 19 November, 2013 18:08

Newly public FireEye, a Milpitas, Calif., company whose sandboxing technology has been the envy of other security companies, is the fastest growing network company on this year's Deloitte Fast 500 list.

Researchers dare AI experts to crack new GOTCHA password scheme

By Bob Brown | 07 November, 2013 21:26

If you can't tell the difference between an inkblot that looks more like "body builder lady with mustache and goofy in the center" than "large steroid insect with big eyes," then you can't crack passwords protected via a new scheme created by computer scientists that they've dubbed GOTCHA.

Microsoft security guru: Abusing data should be a felony

By Bob Brown | 10 October, 2013 20:54

If Microsoft's chief security adviser had his way, it would be a felony to misuse personal data.

Security automation research – with a human touch – could net nearly $50M grant

By Bob Brown | 09 October, 2013 14:56

Researchers from Carnegie Mellon University and Army Research Laboratory will join forces with those from a handful of universities in an effort to better automate cybersecurity decisions. The five-year project has attracted $23.2 million in funding from CMU's CyLab, and could be extended to $48.2 million over 10 years.

VCs throwing gobs of money at cloud, security, mobile startups

By Bob Brown | 10 September, 2013 18:09

Tech startups focused in hot areas such as virtualization, mobility and security have pulled in tens of millions of dollars over the past week or so from venture capitalists looking to back the next big thing.

Apple iPhone 5S and 5C announcement live blogs: Take your pick!

By Bob Brown | 10 September, 2013 16:11

The next best thing to being on the Apple campus in Silicon Valley for its product announcement extravaganza Tuesday is following along with live blogs of the action.

National Cyber Security Hall of Fame inducting five

By Bob Brown | 10 September, 2013 12:23

The National Cyber Security Hall of Fame has announced five security pioneers will be inducted next month for their work on such fronts as intrusion detection and trusted computing.

Mockumentary skewers ISPs as Verizon-FCC net neutrality case goes to court

By Bob Brown | 09 September, 2013 18:04

A new mockumentary posted on YouTube and backed by a group of net neutrality advocates makes the case that the FCC is right and Verizon is wrong in a fight that today goes to the U.S. Court of Appeals for the District of Columbia Circuit.

Free annual MIT security conference expands beyond Kerberos

By Bob Brown | 08 August, 2013 23:15

The annual MIT-hosted conference devoted to the Kerberos network authentication protocol now has a broader mission.

Malware fighter FireEye files for $175M IPO

By Bob Brown | 05 August, 2013 22:05

FireEye could soon be known on the stock market as FEYE if its plans to go public in a $175 million bid made official with the SEC today come to fruition.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-420

In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.