Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology.

Intel is Maintaining Legacy Technology for Security Research

Schneier on Security

Interesting : Intel’s issue reflects a wider concern: Legacy technology can introduce cybersecurity weaknesses. Tech makers constantly improve their products to take advantage of speed and power increases, but customers don’t always upgrade at the same pace.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

On Chinese-Owned Technology Platforms

Schneier on Security

I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”

Should There Be Limits on Persuasive Technologies?

Schneier on Security

But as with many things, technology is fundamentally changing the nature of persuasion. Democratic societies, in particular, are in dire need of a frank conversation about the role persuasion plays in them and how technologies are enabling powerful interests to target audiences.

Should Technology Product Training Be Free?

Lohrman on Security

Governnment Software Vendor Tyler Technologies Announces Breach

Adam Levin

Tyler Technologies, a software and technology provider for U.S. The post Governnment Software Vendor Tyler Technologies Announces Breach appeared first on Adam Levin. Data Security Government Cybersecurity Data breach featured data breach tyler technologies government breach

Govt. Services Firm Tyler Technologies Hit in Apparent Ransomware Attack

Krebs on Security

Tyler Technologies , a Texas-based company that bills itself as the largest provider of software and technology services to the United States public sector, is battling a network intrusion that has disrupted its operations. Ransomware ransomware Tyler Technologies tylertech.com

Keysight Technologies Acquires SCALABLE Network Technologies

Dark Reading

Simulation and modeling solutions augment Keysight's 5G and cybersecurity portfolio

11 technologies improving database security

CSO Magazine

Now, sophisticated tools and technologies are making it possible for database developers to have their cake and, to stay in metaphor, not count the calories by keeping the information private.

The Evolution of Automation Technologies

Security Boulevard

Automation is making waves in many industries worldwide and encompasses a wide range of technologies including endpoint management, robotic process Read More. The post The Evolution of Automation Technologies appeared first on Kaseya.

Threat Model Thursday: Technology Consumers

Adam Shostack

It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.” They’re working on living their lives, and hoping technology helps.

Bogus Security Technology: An Anti-5G USB Stick

Schneier on Security

Enterprises Planning SecOps Technology Deployments

Dark Reading

With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year

Cigent Technology Extends Firmware to Secure SSDs

Security Boulevard

Cigent Technology today launched Cigent Data Defense, an offering that combines existing multifactor authentication and encryption capabilities to secure sensitive data residing on solid-state drives (SSDs).

Dell Technologies Streamlines Data Protection for VMware

Security Boulevard

Dell Technologies today unveiled an approach to capturing snapshots used to protect data in VMware environments that promises to reduce the total cost of defending organizations from ransomware.

WFS Securely Changes Technology Approach

Security Boulevard

The post WFS Securely Changes Technology Approach appeared first on Sonrai Security. The post WFS Securely Changes Technology Approach appeared first on Security Boulevard.

Five James Bond gadgets which use real world technologies

CyberSecurity Insiders

To celebrate the recent release of the latest film No Time to Die , here’s our top five gadgets from the quintessential spy series, and how they relate to technologies we see in everyday life.

BlackMatter ransomware gang hit Technology giant Olympus

Security Affairs

Technology giant Olympus announced it was the victim of a ransomware attack and is currently investigating the extent of the incident. Japan-headquartered Olympus manufactures optical and digital reprography technology for the medical and life sciences industries.

French court indicted Nexa Technologies for complicity in acts of torture

Security Affairs

Nexa Technologies was indicted for complicity in acts of torture, the French firm is accused of having sold surveillance equipment to the Egypt. Nexa Technologies offers a range of solutions for homeland security, including surveillance solutions.

Is Ransomware a Technology Pandemic in the Making?

Security Boulevard

The post Is Ransomware a Technology Pandemic in the Making? Ten years ago, ransomware attacks were inconvenient. But today, they present an apocalyptic national security threat capable of crippling infrastructure that the population depends on. “No

NSO Group, Positive Technologies and other firms sanctioned by the US government

Security Affairs

LTD from Singapore, and Positive Technologies from Russia. Positive Technologies and Computer Security Initiative Consultancy PTE. The post NSO Group, Positive Technologies and other firms sanctioned by the US government appeared first on Security Affairs. The U.S.

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Then there's this: Today, the Information & Communication Technology (ICT) industry dominates, with salaries from six roles within the industry featuring in the top 20. Patience. Frugality. Sacrifice.

Welcome Bureau of Cyberspace Security and Emerging Technologies (CSET)

Security Affairs

United States Department of State approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET). CSET will be tasked to secure cyberspace and protect critical technologies, and reduce the likelihood of cyber conflict.

BlackMatter ransomware hits medical technology giant Olympus

Bleeping Computer

Olympus, a leading medical technology company, is investigating a "potential cybersecurity incident" that impacted some of its EMEA (Europe, Middle East, Africa) IT systems last week. [.].

MITRE Shield Matrix Highlights Deception & Concealment Technology

Dark Reading

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape

How Real-Time Technologies Are Helping Protect Vulnerable Energy Assets

Doctor Chaos

As the world increasingly relies on technology, the energy sector’s role becomes more critical. While securing these systems comes with some unique challenges, real-time technology is helping. Thankfully, technology provides a solution.

Zscaler Buys Deception Technology Startup

Dark Reading

ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

eSecurity Planet

Gartner analyst Ruggero Contu noted that security risks are becoming external: the software supply chain , the public cloud , the trading of breached data, and IoT and operational technology (OT) are all threats outside of traditional perimeter security.

Advanced Technology Ventures discloses ransomware attack and data breach

Security Affairs

The American venture capital firm Advanced Technology Ventures (ATV) disclosed a ransomware attack, crooks also stole data of some private investors. Advanced Technology Ventures (ATV) is an American venture capital firm with more than $1.8

FBI Raids Chinese Point-of-Sale Giant PAX Technology

Krebs on Security

federal investigators today raided the Florida offices of PAX Technology , a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. FBI agents entering PAX Technology offices in Jacksonville today.

The 5 most annoying things in technology

Tech Republic Security

These five things are driving us crazy, says Tom Merritt. There's hope for some to get better

Encryption & Privacy Policy and Technology

Adam Shostack

The Open Technology Institute has an Open Letter to Law Enforcement in the U.S., In closely related news, nominations for the 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies are open. Lastly, the Port of Seattle is considering putting rules in place around facial recognition technology. UK, and Australia: Weak Encryption Puts Billions of Internet Users at Risk. press release , letter.) I am pleased to be one of the signers.

How Technology and Politics Are Changing Spycraft

Schneier on Security

Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story; cell phone and other electronic surveillance techniques make tracking people easier; and machine learning will make all of this automatic. Meanwhile, Western countries have new laws and norms that put them at a disadvantage over other countries. And finally, much of this has gone corporate.

XDR Pushing Endpoint Detection and Response Technologies to Extinction

Dark Reading

Ironically, EDR's success has spawned demand for technology that extends beyond it

How Real-Time Technologies Are Helping Protect Vulnerable Energy Assets

Doctor Chaos

As the world increasingly relies on technology, the energy sector’s role becomes more critical. While securing these systems comes with some unique challenges, real-time technology is helping. Thankfully, technology provides a solution.

Modern Technology, Modern Mistakes

Dark Reading

As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface

Altada Technology Solutions Appoints?Denis Canty as Chief Technology Officer

CyberSecurity Insiders

Denis will lead Altada’s vision for technological advancements in the AI industry to further enable Altada to deliver enhanced outcomes for clients. “We Denis also led emerging technology functions for companies in cloud, cybersecurity automation, computer vision and IoT.

Four technologies that will boost your customers’ Black Friday shopping sprees

CyberSecurity Insiders

With the help of innovative payment technology, of course! From biometric bank cards to payment data protection, here are four payment technologies that can help retailers provide a smooth, seamless shopping experience for customers this Black Friday: EMV Tokenization.

7 Cross-Industry Technology Trends ?That Will Disrupt the World

Dark Reading

Recent McKinsey & Company analysis examines which technologies will have the most momentum in the next ten years. These are the trends security teams need to be aware of in order to protect the organization effectively

Deepfake Detection Poses Problematic Technology Race

Dark Reading

Experts hold out little hope for a robust technical solution in the long term

3 Must-Know Technologies to Protect Your Hybrid Workforce

Dark Reading

Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users

Three ways technology can help revive the music industry

CyberSecurity Insiders

In the context of a world which is becoming ever more connected, we are starting to see more technology being integrated into the music industry. Through this technology, airports have been able to cut down queues, limit costs and offer a high level of security.

Cost Savings, Better Security Drive Adoption of Emerging Technologies

Dark Reading

However, senior technology managers express concerns about whether their current infrastructure can properly safeguard them