Intel launch in pictures
19 Jan | View galleries
Google's started a car company...Samsung puts $85 million into cancer-victim fund...Apple explores offering phone service...and more tech news.
InteliSecure's Chuck Bloomquist talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.
Qualcomm hit with European antitrust probe...Intel slows down Moore's Law...Law enforcement shuts down hacking forum...and more tech news.
Microsoft shares new enterprise tools at partner meetup...Flash is sinking under weight of security flaws...IoT protocol Thread gains steam...and more tech news.
A panel of distinguished cryptographers says letting law enforcement have access to encrypted communications means more vulnerabilities for criminals to exploit and less secure corporate networks.
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the rest of us, here's your shot at redemption via some solid preventive pen testing advice from a genuine pro.
Is it possible to secure the Internet? And if so, what would it cost?
Everyone knows that IT is a cost center. What many people don't know is that recognizing and leveraging the connection between security risk mitigation and profits can create profit margin growth.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
In our recent article, we highlighted that every significant and public attack exploited people to either get an initial foothold in a target organization or as the entire attack vector. These attacks highlight the need for awareness as a top concern of security programs.