UPS Data Breach

UPS

Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. In a recent report, the company actually lowered its earnings […]

Security Innovation Network SINET 16 Application Process Now Open

SINET_logo_for_twitter

We have previously written about the Security Innovation Network (SINET) and the yearly SINET Showcase.  This is a group every technology firm should have some familiarity with now. Startups should track SINET as a way to learn and perhaps expose your technology to the community. Established security firms should track SINET to learn of emerging […]

More Questions than Answers from Data Breach Report

internet-of-things-2

The American media has never paid more attention to data breaches and cybersecurity than it does today. Major breaches in the last year – at large companies like Target and eBay – have made information security discussions more worrying and more widespread, albeit still not universally understood. On August 5th, Nicole Perlroth and David Gelles […]

Overcoming the Equation: Security = Friction

blueprint-close_00339844

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. Not bad, but suppose policy requires 12 or more characters; we have to pad the password: […]

The Internet of (Secure) Things – Embedding Security in the IoT

hpinternetofthings

We’re seeing a glimmer of the future – the Internet of Things (IoT) – where anything and everything is or contains a sensor that can communicate over the network/Internet. The underlying technology enabling IoT is Machine-to-Machine (M2M) communications. Your running shoe tracks your workouts, sending the data to a mobile app. Your wristband tracks your […]

Nextgov Enables Examination Of Big Data’s Role in Cybersecurity

big-data-eye

Three highly regarded community technologists will meet in a NextGov morning event 3 June 2014 to examine Big Data’s Role in Cybersecurity. Details from the invite: When addressing cybersecurity, it is tempting to think that strengthening walls is enough to prevent unwanted intruders–yet data breaches continue to occur at alarming rates. Facing increasingly sophisticated adversaries, bigger […]