Wormiversary!
November 2, 2013 is the 25th anniversary of the Morris Worm. In the intervening years, we have not solved the problems of buffer overflows, reusable single-factor credentials, peer-to-peer trust or password…
November 2, 2013 is the 25th anniversary of the Morris Worm. In the intervening years, we have not solved the problems of buffer overflows, reusable single-factor credentials, peer-to-peer trust or password…
Two secure email services, Lavabit and Silent Circle, on Wednesday announced the formation of the Dark Mail Alliance. The announcement at the Inbox Love email conference in Mountain View, California, follows the shuttering…
Speaking at the Michigan Cybersecurity Summit on October 25, Thomas MacLellan, Director, Homeland Security and Public Safety Division, National Governors Association (NGA) Center for Best Practices, called FirstNet the “largest…
Thanks to a directive from President Barak Obama, NIST has released its Preliminary Cybersecurity Framework for critical infrastructure. Like most security frameworks it is fatally flawed. The framework is poisoned…
Michigan’s Cyber Summit 2013 opens on Wednesday as part of the National Cyber Security Awareness Month. Michigan Governor Rick Snyder is hosting the Summit, held last in 2011. It includes…
How do you defend against something that’s never been seen before? That’s the key question organizations struggle with. A decade ago, the first victims of any worm or virus outbreak…
So whoopie-do, the new iPhone has a fingerprint reader to unlock the phone as a market differentiator, and to open new authentication applications and developer opportunities – assuming Apple opens…
CIOs are often distracted by their efforts to keep up with specific regulations according to Gartner, Inc. “CIOs must stop being rule followers who allow compliance to dominate business decision…
A European judge recently blocked a security researcher’s paper describing how to bypass a car’s immobilizer theft-protection system. The Next Generation of airline control systems is designed to efficiently improve…
No business can avoid “the cloud.” Some embrace cloud based services with enthusiasm as a formal way of delivering all or part of a given organization’s IT requirements, whilst others…