Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology.

On Chinese-Owned Technology Platforms

Schneier on Security

I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Governnment Software Vendor Tyler Technologies Announces Breach

Adam Levin

Tyler Technologies, a software and technology provider for U.S. The post Governnment Software Vendor Tyler Technologies Announces Breach appeared first on Adam Levin. Data Security Government Cybersecurity Data breach featured data breach tyler technologies government breach

Should Technology Product Training Be Free?

Lohrman on Security

Should There Be Limits on Persuasive Technologies?

Schneier on Security

But as with many things, technology is fundamentally changing the nature of persuasion. Democratic societies, in particular, are in dire need of a frank conversation about the role persuasion plays in them and how technologies are enabling powerful interests to target audiences.

Govt. Services Firm Tyler Technologies Hit in Apparent Ransomware Attack

Krebs on Security

Tyler Technologies , a Texas-based company that bills itself as the largest provider of software and technology services to the United States public sector, is battling a network intrusion that has disrupted its operations. Ransomware ransomware Tyler Technologies tylertech.com

Technology and Policymakers

Schneier on Security

Technology is now deeply intertwined with policy. It's all changing fast; technology is literally creating the world we all live in, and policymakers can't keep up. This technology has the potential to augment human decision-making, eventually replacing notoriously subjective human processes with something fairer, more consistent, faster and more scalable. The answer requires a deep understanding of both the policy tools available to modern society and the technologies of AI.

Threat Model Thursday: Technology Consumers

Adam Shostack

It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.” They’re working on living their lives, and hoping technology helps.

The Evolution of Automation Technologies

Security Boulevard

Automation is making waves in many industries worldwide and encompasses a wide range of technologies including endpoint management, robotic process Read More. The post The Evolution of Automation Technologies appeared first on Kaseya.

Bogus Security Technology: An Anti-5G USB Stick

Schneier on Security

WFS Securely Changes Technology Approach

Security Boulevard

The post WFS Securely Changes Technology Approach appeared first on Sonrai Security. The post WFS Securely Changes Technology Approach appeared first on Security Boulevard.

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Then there's this: Today, the Information & Communication Technology (ICT) industry dominates, with salaries from six roles within the industry featuring in the top 20. Patience. Frugality. Sacrifice.

Cigent Technology Extends Firmware to Secure SSDs

Security Boulevard

Cigent Technology today launched Cigent Data Defense, an offering that combines existing multifactor authentication and encryption capabilities to secure sensitive data residing on solid-state drives (SSDs).

How Real-Time Technologies Are Helping Protect Vulnerable Energy Assets

Doctor Chaos

As the world increasingly relies on technology, the energy sector’s role becomes more critical. While securing these systems comes with some unique challenges, real-time technology is helping. Thankfully, technology provides a solution.

How Real-Time Technologies Are Helping Protect Vulnerable Energy Assets

Doctor Chaos

As the world increasingly relies on technology, the energy sector’s role becomes more critical. While securing these systems comes with some unique challenges, real-time technology is helping. Thankfully, technology provides a solution.

Encryption & Privacy Policy and Technology

Adam Shostack

The Open Technology Institute has an Open Letter to Law Enforcement in the U.S., In closely related news, nominations for the 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies are open. Lastly, the Port of Seattle is considering putting rules in place around facial recognition technology. UK, and Australia: Weak Encryption Puts Billions of Internet Users at Risk. press release , letter.) I am pleased to be one of the signers.

UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root

Malwarebytes

Researchers at RandoriSec have found serious vulnerabilities in the firmware provided by UDP Technology to Geutebrück and many other IP camera vendors. The post UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root appeared first on Malwarebytes Labs.

Zscaler Buys Deception Technology Startup

Dark Reading

ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products

How Technology and Politics Are Changing Spycraft

Schneier on Security

Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story; cell phone and other electronic surveillance techniques make tracking people easier; and machine learning will make all of this automatic. Meanwhile, Western countries have new laws and norms that put them at a disadvantage over other countries. And finally, much of this has gone corporate.

Google Chrome tweaks data privacy with FLoC technology

CyberSecurity Insiders

Google Chrome seems to have taken data privacy seriously as it is ditching its usual cookies technology to be replace it by FloC technology. As this technology was following web surfers without their permission, Safari and Firefox said goodbye to this tech long back.

US Indicts Hackers For Theft of Technology, Covid-19 Research

Adam Levin

More recently, they researched vulnerabilities in the networks of biotech and other firms publicly known for work on COVID-19 vaccines, treatments, and testing technology,” stated the indictment. The U.S.

Finalists: Best Emerging Technology

SC Magazine

Just as the threat landscape evolves, so must the technology used by the cybersecurity community to respond. FINALIST | BEST EMERGING TECHNOLOGY. FINALIST | BEST EMERGING TECHNOLOGY. FINALIST | BEST EMERGING TECHNOLOGY. FINALIST | BEST EMERGING TECHNOLOGY.

Should Technology Product Training Be Free?

Security Boulevard

This was an excerpt that came from a CISO podcast series with several respected security and technology industry leaders, like David. The post Should Technology Product Training Be Free?

Stop betting on detection-based security technology

SC Magazine

Unfortunately, security leaders have to rely on outdated detection-based technologies and solutions. Contrary to public perception, there’s no shortage of technology available that can prevent all types of threats from infiltrating corporate networks.

MITRE Shield Matrix Highlights Deception & Concealment Technology

Dark Reading

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape

Veracode Launches Technology Alliance Program

Security Boulevard

The program, which already incorporates a dozen providers including Accurics, Imperva®, The post Veracode Launches Technology Alliance Program appeared first on Security Boulevard. Extends partner ecosystem making it easier to deliver secure software at scale BURLINGTON, Mass.

Welcome Bureau of Cyberspace Security and Emerging Technologies (CSET)

Security Affairs

United States Department of State approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET). CSET will be tasked to secure cyberspace and protect critical technologies, and reduce the likelihood of cyber conflict.

Deepfake Detection Poses Problematic Technology Race

Dark Reading

Experts hold out little hope for a robust technical solution in the long term

Modern Technology, Modern Mistakes

Dark Reading

As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface

Cost Savings, Better Security Drive Adoption of Emerging Technologies

Dark Reading

However, senior technology managers express concerns about whether their current infrastructure can properly safeguard them

ZeroNorth Joins Veracode’s Technology Alliance Program

Security Boulevard

The post ZeroNorth Joins Veracode’s Technology Alliance Program appeared first on ZeroNorth. The post ZeroNorth Joins Veracode’s Technology Alliance Program appeared first on Security Boulevard.

Check Point Technologies offers Cloud Security Educational Program

CyberSecurity Insiders

Check Point Software Technologies in partnership with Platinum Elite ATC Partners will offer a cloud security training program that is aimed at partners and IT professionals who can nourish their career development skills in security to meet the global demand.

Votiro Partners with Gotham Technology Group to Expand Access to Positive Selection® Technology

Security Boulevard

The post Votiro Partners with Gotham Technology Group to Expand Access to Positive Selection® Technology appeared first on Security Boulevard.

Introducing the Veracode Technology Alliance Program

Security Boulevard

re excited to introduce our Technology Alliance Program (TAP). The new program emphasizes our commitment to developing partnerships with adjacent technology providers that produce best-in-class technology integrations.

XDR Pushing Endpoint Detection and Response Technologies to Extinction

Dark Reading

Ironically, EDR's success has spawned demand for technology that extends beyond it

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

The Last Watchdog

I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist. Related: ‘ Risk-based’ analysis used in SOAR At RSA 2020 , I learned about yet another emerging approach, with supporting technology, called Security Operations Platform (SOP.)

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 million worth of chips was stolen online in 2011 Cyber-attacks are expected to cost global businesses $2 trillion by 2019 Software called NORA has been developed to prevent cyber attacks Phishing is a popular way of scamming casino players There’s no […]. Crypto Currency crypto currency

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 million worth of chips was stolen online in 2011 Cyber-attacks are expected to cost global businesses $2 trillion by 2019 Software called NORA has been developed to prevent cyber attacks Phishing is a popular way of scamming casino players There’s no […]. InfoSec casinos infosec security awareness

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 million worth of chips was stolen online in 2011 Cyber-attacks are expected to cost global businesses $2 trillion by 2019 Software called NORA has been developed to prevent cyber attacks Phishing is a popular way of scamming casino players There’s no […]. InfoSec casino infosec security awareness

Public Sector Mega-Vendor Tyler Technologies Says It Was Hacked

The Security Ledger

Tyler Technologies, the U.S.’s Business critical infrastructure election systems ERP Government Malware ransomware Technology Threats Top Stories Tyler Technologies

Three ways technology can help revive the music industry

CyberSecurity Insiders

In the context of a world which is becoming ever more connected, we are starting to see more technology being integrated into the music industry. Through this technology, airports have been able to cut down queues, limit costs and offer a high level of security.

How to Mitigate Risk Against Operational Technology (OT)

Security Boulevard

Operational technology, or OT, is hardware and software technologies that monitor and control a variety of physical operations including, but not limited to processes, devices, and even various infrastructures like public rail transportation.

Risk 56

Solid8 Technologies Exclusive Distributor for comforte AG

Security Boulevard

They are partnering with Solid8 Technologies and its affiliate Solid8 International to bring Southern Africa a continuous approach to data discovery and data security that is easy to implement.