What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2018-12-06 14:10:01 The Next Fraud Domain: Search Results (lien direct) Your search results are the next frontier for online scammers and fraud, including identity theft, warns Angel Grant of RSA's Fraud & Risk Intelligence group.*  The post The Next Fraud Domain: Search Results
Blog.webp 2018-12-05 21:38:00 Researchers: GDPR Already Having Positive Effect on Cybersecurity in EU (lien direct) The General Data Privacy Regulation (GDPR) seems to already be having a positive effect on the state of cybersecurity in Europe less than seven months after it was enacted, showing that policy indeed can have a direct effect on organizations' security practices, security researchers said. The post Researchers: GDPR Already Having Positive Effect...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/583906882/0/thesecurityledger -->»
Blog.webp 2018-12-04 21:04:02 Podcast Episode 123: HaveIBeenPwned\'s Troy Hunt on Marriott\'s Big Mess and GreatHorn on the Asymmetric Threat of Email (lien direct) Thanks to our friends at GreatHorn for sponsoring this week's podcast. In this episode of the Podcast, # 123: Troy Hunt, the founder of HaveIBeenPwned.com joins us to talk about Marriott International's big mess: a breach of Starwood Hotels' reservation system that revealed information on half a billion (with a "B") guests. And, in our second...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/583720434/0/thesecurityledger -->» Threat
Blog.webp 2018-12-02 16:44:04 Massive Marriott Breach Underscores Risk of overlooking Data Liability (lien direct) The Marriott breach underscores how companies fail to price in the risk of poor data security. In the age of GDPR, that could be an expensive failure.  The post Massive Marriott Breach Underscores Risk of overlooking Data Liability
Blog.webp 2018-11-30 14:07:00 Data Breach Exposes Records of 114 Million U.S. Citizens, Companies (lien direct) A massive database holding more than 114 million records of U.S. citizens and companies was discovered sitting online unprotected due to misconfigured search, a data leak that is estimated to affect about 83 million people. The post Data Breach Exposes Records of 114 Million U.S. Citizens, Companies Data Breach
Blog.webp 2018-11-29 03:28:04 Spotlight: Operationalizing Deep Web and Dark Web Intelligence (lien direct) In this episode of the podcast: Chris Camacho of Flashpoint joins us to talk about "the deep web" and "the dark web." Chris and I talk about how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/582788712/0/thesecurityledger -->»
Blog.webp 2018-11-29 02:23:03 Iranians Indicted in SamSam Ransomware Scheme (lien direct) The federal government charged two Iranian men for orchestrating a nearly three-year-long international hacking and extortion scheme that deployed ransomware which to date has caused more than $30 million in losses to its victims, which include hospitals, municipalities and public institutions. A federal grand jury in New Jersey has indicted...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/582781044/0/thesecurityledger -->» Ransomware
Blog.webp 2018-11-27 04:14:01 Podcast Episode 122: will 5G increase Internet of Things Risk? (lien direct) Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. But what new kinds of Internet of Things use cases may become possible? And, just as important, what are the security implications of massively distributed IoT endpoints connected to capacious 5G cellular infrastructure?...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/582389450/0/thesecurityledger -->»
Blog.webp 2018-11-20 18:55:05 Podcast Episode 121: DMCA Exemptions Set Stage for Right to Repair Fight and DHS Cyber Makeover (lien direct) In this episode of the Security Ledger podcast (#121): the Librarian of Congress gave a big boost to right to repair advocates in late October when she granted exemptions provisions of the Digital Millennium Copyright Act covering repair of most electronic devices. We talk to US PIRG’s Right to Repair campaign coordinator Nathan Proctor...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/581334024/0/thesecurityledger -->»
Blog.webp 2018-11-15 15:17:00 Report: Small, Stealthy Groups Behind Worst Cybercrimes (lien direct) A small group of cybercriminals are responsible for the most damaging cyberattacks--often with the help of state sponsorship. Still, low-level criminal activity on the dark web still poses the most widespread and immediate security threat, with cryptocurrency mining, ransomware and malware all on the rise, a recent report has found. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/580412548/0/thesecurityledger -->» Ransomware Malware
Blog.webp 2018-11-14 22:33:02 (Déjà vu) Survey: Attacks Find Insecure IoT Devices (lien direct) A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints.  The post Survey: Attacks Find Insecure IoT Devices
Blog.webp 2018-11-14 22:33:02 (Déjà vu) Survey Finds Attacks Find Insecure IoT Devices (lien direct) A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints.  The post Survey Finds Attacks Find Insecure IoT Devices
Blog.webp 2018-11-13 23:09:04 Nigerian ISP Hijacks Google Traffic, Sends It Through Russia and China (lien direct) A small Nigerian Internet service provider (ISP) hijacked traffic meant for Google data centers on Monday, re-routing local traffic through China and Russia and making some hosted services temporarily unavailable for users. The post Nigerian ISP Hijacks Google Traffic, Sends It Through Russia and China
Blog.webp 2018-11-13 01:11:03 Podcast Episode 120: They Email Ballots, Don\'t They? (lien direct) In this week's episode (#120): more than 100,000 U.S. voters submitted their ballots in the last presidential election via email in 2016. Despite that: hardly any attention has been paid to the security of email and online voting systems used by 32 states. The post Podcast Episode 120: They Email Ballots, Don’t They?
Blog.webp 2018-11-09 03:03:05 Bank Attacks Put Password Insecurity Back in the Spotlight (lien direct) Two separate attacks on banks in the United States and Pakistan revealed this week highlight once again the inherent weakness of a security practice that relies on passwords or knowledge-based credentials to protect critical information. International bank HSBC said it was a victim of a credential-stuffing and became aware of unauthorized access...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/579231642/0/thesecurityledger -->»
Blog.webp 2018-11-06 20:49:03 Feds, Facebook Join Forces to Prevent Mid-Term Election Fraud (lien direct) The U.S. government and social media firms took action to suspend bogus accounts ahead of Tuesday’s midterm elections. (Photo by Paul Roberts) Federal authorities, social media companies, and the U.S. military are on cybersecurity high alert for fraud, suspicious online activity or other security glitches that could cast a shadow on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578748236/0/thesecurityledger -->»
Blog.webp 2018-11-06 20:32:02 Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails (lien direct) In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Also: we speak with Senthil Ramakrishnan, a lead member of AT&T's IoT Security group about that company’s plans to work with Ericsson to certify the security of IoT devices....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578746320/0/thesecurityledger -->» Guideline
Blog.webp 2018-11-04 15:08:01 Managed Threat Hunting Bridges the Talent Gap (lien direct) Skilled operators make all the difference in incident response and threat hunting. With talent scarce (and expensive), however, managed threat hunting teams may be worth a look, writes Scott Taschler of the firm Crowdstrike. As we discussed in “Uncovering the Unknown Unknowns,” threat hunting is a critical discipline that more organizations...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578376292/0/thesecurityledger -->» Threat
Blog.webp 2018-11-02 10:30:01 Report: China Eyes IoT as Next Front of Cyber War on U.S. (lien direct) China is eyeing dominance of the Internet of Things (IoT) market and may use vulnerabilities in these technologies as the next front on its ongoing cyberwar with the United States, according to a new report. The post Report: China Eyes IoT as Next Front of Cyber War on U.S.
Blog.webp 2018-10-31 16:00:00 Sextortionist Campaigns Get Personal, Creative to Force Payouts (lien direct) Two security firms warn of a flurry of "sextortion" campaigns recently that use new, creative and sometimes extreme methods that leverage personal information, sex-related activity and even death threats to spur victims to pay thousands in ransom fees to hackers. The post Sextortionist Campaigns Get Personal, Creative to Force Payouts appeared...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/577729856/0/thesecurityledger -->»
Blog.webp 2018-10-30 02:21:05 Podcast Episode 118: White Hat Eye on the Gaming Guy (lien direct) In this week's episode, #118: modern computer games are like mini economies and that makes them a big target for hackers. We talk with four leading researchers from Bug Crowd about how even popular games fall down on security. Also: Srinivas Mukkamala, the CEO of RiskSense about how artificial intelligence and risk based approaches to securing...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/577384752/0/thesecurityledger -->» Guideline
Blog.webp 2018-10-25 14:21:02 Research: Russian Disinformation Campaigns Target African Americans (lien direct) Russian misinformation campaigns have been targeting African Americans in a number of ways to create division between left and right political agendas, create racial division and discord, and even suppress Black voter turnout, new research has found. Two recent reports outline how Russian information operations are crafting stereotypical online...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/576649814/0/thesecurityledger -->»
Blog.webp 2018-10-24 14:22:02 Report: Obvious Security Flaws Make ICS Networks Easy Targets (lien direct) Industrial control systems (ICSs) remain easy targets for nation-states actors because of security gaps such as plain-text passwords, direct Internet connections and weak anti-virus protections, a new report has found. The warnings about industrial control systems running on Windows XP are becoming a thing of the past; ICS administrators seem to...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/576465310/0/thesecurityledger -->»
Blog.webp 2018-10-23 21:16:00 Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats (lien direct) In this episode of the podcast (#117), we go deep on one of the hottest sectors around: cyber insurance. In the first segment, we talk with Thomas Harvey of the firm RMS about the problem of “silent cyber” risk to insurers and how better modeling of cyber incidents is helping to address that threat. In part II, we invite Chip Block of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/576345298/0/thesecurityledger -->»
Blog.webp 2018-10-18 19:09:02 Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk (lien direct) In this Spotlight Podcast, sponsored by RSA: October is Cybersecurity Awareness Month. But what does that mean in an era when concerns about cybersecurity permeate every facet of our personal and professional lives? Russ Schrader of the National Cybersecurity Alliance (NCSA) and Angel Grant of RSA join us to discuss the history of Cybersecurity...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/575422200/0/thesecurityledger -->»
Blog.webp 2018-10-15 21:33:05 Podcast Episode 116: Cryptojacking and MikroTik\'s Bad-Feeling Feel Good Patch Story (lien direct) MikroTik is part of a bigger problem: the failure of infrastructure owners to take appropriate action to address serious security holes in products. The post Podcast Episode 116: Cryptojacking and MikroTik’s Bad-Feeling Feel Good Patch Story
Blog.webp 2018-10-09 17:00:05 Podcast Episode 115: Joe Grand on Unicorn Spotting and Bloomberg\'s Supply Chain Story (lien direct) In this week's episode (#115), noted hardware enthusiast and hacker Joe Grand (aka “Kingpin”) told reporters from Bloomberg that finding an in-the-wild supply chain hack implanting malicious hardware on motherboards was akin to witnessing “a unicorn jumping over a rainbow.” They went with their story about just such an...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/573788130/0/thesecurityledger -->» Hack
Blog.webp 2018-10-05 00:36:03 Apple, Amazon Throw Shade on Supply Chain Hack Story (lien direct) A report by Bloomberg alleging a massive operation by China’s Peoples Liberation Army (PLA) to plant spy hardware on servers used by some of the U.S.’s most high profile corporations is being refuted by tech vendors Apple as well as Amazon, who contend that no such compromises took place. The report written by Jordon Robinson and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572886254/0/thesecurityledger -->» Hack
Blog.webp 2018-10-03 11:30:03 NotPetya Horror Story Highlights Need for Holistic Security (lien direct) The NotPetya malware’s ability to cripple even sophisticated, global firms is a cautionary tale about the need for businesses to understand their risk and take a holistic view of security says Fadi Albatal, Chief Strategy Officer at Hitachi Systems Security.* If you're keen on information security and happen to enjoy horror stories, point...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572593864/0/thesecurityledger -->» NotPetya
Blog.webp 2018-10-02 17:38:04 Episode 114: Complexity at Root of Facebook Breach and LoJax is a RAT You Can\'t Kill (lien direct) In this week's podcast: Facebook revealed that a breach affected 50 million accounts and as many as 90 million users. Is complexity at the root of the social media giant’s troubles? We speak with Gary McGraw of the firm Synopsys about it. Also: BIOS-based malware has been demonstrated at security conferences for years.  Last week, the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572474336/0/thesecurityledger -->» Malware
Blog.webp 2018-10-02 12:18:00 How Digital Transformation is forcing GRC to evolve (lien direct) As new risks emerge, security and risk management are converging and driving the development of integrated risk management, writes David Walter, the Vice President of RSA's Archer division. The post How Digital Transformation is forcing GRC to evolve
Blog.webp 2018-09-28 22:19:00 Massive Facebook Breach Affects 90 Million Accounts (lien direct) Facebook forced a reset of more than 50 million user accounts on Thursday and would force another 40 million account resets in the coming days, citing a major breach of the site’s security that allowed unknown attackers to take over people’s accounts. The company said its own engineering team discovered the flaw, which involved the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/571921256/0/thesecurityledger -->»
Blog.webp 2018-09-26 20:36:00 Report: Hacking Risk for Connected Vehicles Shows Significant Decline (lien direct) Smart vehicles are less vulnerable than they were a few years ago, thanks to improvements in security according to a new report from the security firm IOActive. IOActive conducted vulnerability assessments of real-world vehicle systems for its “Commonalities in Vehicle Vulnerabilities 2018 Remix” paper, and found that both the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/571582154/0/thesecurityledger -->» Vulnerability
Blog.webp 2018-09-25 22:20:01 AggregateIQ Faces First GDPR Enforcement Over Data-Privacy Dispute (lien direct) AggregateIQ, one of the companies at the heart of the Facebook unauthorized data-sharing scandal, could be one of the first companies to face penalties under the European Union’s recently implemented General Data Protection Regulation (GDPR). The United Kingdom’s (UK’s) Information Commissioner’s Office (ICO) quietly...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/571423314/0/thesecurityledger -->»
Blog.webp 2018-09-25 16:20:04 Podcast Episode 113: SAP CSO Justin Somaini and Election Hacks – No Voting Machines Required! (lien direct) Everybody worries about hacked voting machines. But an exercise in Boston last week showed how hackers can compromise the vote without ever touching an election system. Also: October is just around the corner and that means Cyber Security Awareness Month is upon us. So what are top cyber security professionals “aware of” these days? We talk...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/571374224/0/thesecurityledger -->»
Blog.webp 2018-09-22 03:05:05 In Boston Exercise, Election Hackers Bypass Voting Machines (lien direct) At an exercise in Boston that imagined a cyber attack designed to disrupt an important election in a “swing state,” voting machines were not an issue.  It’s election day in Nolandia, an imaginary, mid-sized U.S. city in a key “swing” state, and things are not going as planned – at least for government...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/571116482/0/thesecurityledger -->»
Blog.webp 2018-09-20 12:44:04 Mirai Creators Cooperate with Feds to Avoid Prison (lien direct) The three 20-something-year-old creators of the Mirai botnet have cooperated with the federal investigators on their case to avoid jail time. The three men–Paras Jha, 22, of Fanwood, New Jersey; Josiah White, 21, of Washington, Pennsylvania; and Dalton Norman, 22, of Metairie, Louisiana–were sentenced by a federal judge in Alaska to...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/570579702/0/thesecurityledger -->»
Blog.webp 2018-09-19 10:00:02 Report: Financial industry in crosshairs of credential-stuffing botnets (lien direct) Botnets mounting credential-stuffing attacks against the financial industry are on the rise, with a more than 20-percent uptick in a two-month period, a new report from Akamai has found. Bad actors from the United States, Russia and Vietnam are using credential stuffing attacks to try to compromise financial services firms, Akamai says in its...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/570432204/0/thesecurityledger -->»
Blog.webp 2018-09-17 20:22:00 Podcast Episode 112: what it takes to be a top bug hunter (lien direct) In this week’s episode (#112): top bug hunters can earn more than $1 million a year from “bounties” paid for information on exploitable software holes in common platforms and applications. What does it take to be among the best? We talk with Jason Haddix of the firm Bug Crowd to find out. Also: The Internet Society’s Jeff...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/570144920/0/thesecurityledger -->»
Blog.webp 2018-09-13 12:59:05 Veeam mishandles Own Data, exposes 440M Customer E-mails (lien direct) Data-management Veeam found itself in need of some self-help after mismanaging its own data with a misconfigured server that exposed more than 440 million e-mail addresses and other types of customer information. Security researcher Bob Diachenko discovered that a MongoDB server operated by Veeam was left wide open and searchable for some days in...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/569460936/0/thesecurityledger -->»
Blog.webp 2018-09-12 13:37:01 Spotlight Podcast: Flashpoint\'s Allison Nixon on SIM Swapping and the Looming Online Identity Crisis (lien direct) Your smart phone does double and triple duty: letting you do banking, buy a cup of coffee, board a plane or access a sensitive online account. But that doesn’t mean that your phone number is equally as trustworthy. In this Spotlight Podcast, we speak with Flashpoint* head of research Allison Nixon about how a recent rash of SIM swapping...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/569266774/0/thesecurityledger -->»
Blog.webp 2018-09-10 21:00:01 Podcast Episode 111: Click Here to Kill Everybody and CyberSN on Why Security Talent Walks (lien direct) In this week’s podcast (episode #111), sponsored by CyberSN: what happens when the Internet gets physical? Noted author and IBM security guru Bruce Schneier joins us to talk about his new book on Internet of Things risk: Click Here to Kill Everybody. Also: everyone knows that cyber security talent is hard to come by, and even harder to keep....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/568966730/0/thesecurityledger -->»
Blog.webp 2018-09-06 21:04:03 Opinion: The Corporate Lessons of Election Hacks (lien direct) Recent demonstrations of election hacks are about more than ballots. They also contain important lessons for enterprises,  Security Ledger Editor in Chief Paul Roberts argues in this opinion piece. (Note: this post first appeared on Hitachi Security Systems web site.) Did an 11 year old hack a state election website? Are voting machines easy prey...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/568344144/0/thesecurityledger -->» Hack
Blog.webp 2018-09-06 01:58:01 Before Senate Facebook, Twitter Defend Efforts to Stop Fake News (lien direct) Facebook and Twitter executives defended recent efforts to stop the use of their platforms by Russia, Iran and other countries to influence U.S. elections. In testimony before the U.S. Senate, Facebook COO Sheryl Sandberg and Twitter Chief Executive Jack Dorsey on Wednesday defended their employers’ recent efforts to thwart influence...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/568193918/0/thesecurityledger -->»
Blog.webp 2018-09-04 12:31:02 Collection Management: a Crash-Course (lien direct) Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program. Collection management is one of the most overlooked and misunderstood aspects of an...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/567851504/0/thesecurityledger -->»
Blog.webp 2018-08-30 10:30:03 (Déjà vu) Video: How Automation and Machine Learning Power Future of SIEM (lien direct) In this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s RSA Netwitness SIEM product is evolving to keep pace with a fast -evolving security market. Job 1: use machine learning and automation to allow customers to make the best use of their human resources.  If you want to understand the challenges...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566909896/0/thesecurityledger -->»
Blog.webp 2018-08-30 10:30:03 (Déjà vu) Automation, Machine Learning Power Future of SIEM (lien direct) In this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market. Job 1: use machine learning and automation to allow customers to make the best use of their human resources.  If you want to understand the challenges facing...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566909896/0/thesecurityledger -->»
Blog.webp 2018-08-29 16:12:01 Voting Machine Maker Defends Refusal of White-Hat Hacker Testing at DEF-CON (lien direct) Voting machine maker Election Systems & Software (ES&S) defended its decision not to participate in a white-hat hacking event at this year’s DEF-CON to test the security of voting systems, saying such hack-a-thons could actually jeopardize election security and invite hackers to disrupt electronic voting systems. Not allowing its...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566781672/0/thesecurityledger -->»
Blog.webp 2018-08-29 02:01:03 North Korea\'s Lazarus Tied to Cryptojacking Campaign Targeting MacOS (lien direct) North Korean state-sponsored hacking group Lazarus is believed to be behind a recent crypto jacking attack on several banks with an unexpected twist–the use of a Trojan that tricked a company employee into downloading malware, according to Kaspersky Lab. Kaspersky researchers made what they call the “unexpected discovery” while...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566684710/0/thesecurityledger -->» APT 38
Blog.webp 2018-08-28 10:30:05 Three Decades On: RSA Labs Sets Course for Future (lien direct) RSA Chief Technology Officer and head of RSA Labs Zulfikar Ramzan says his company, which pioneered commercial applications of public key cryptography, is setting its sites on the future as it looks to embrace the disruptive security solutions of the future.  The joke is that “change is the only constant” in the information security...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566563342/0/thesecurityledger -->»
Last update at: 2024-04-27 00:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter