Security Bytes

Recent Posts

  • Why Hillary can't mail

    Robert Richardson - Editorial Director 04 Mar 2015
  • Reporting by The New York Times notwithstanding, it appears to this non-lawyer that Hillary Clinton probably didn't break any laws by using a personal email account to conduct state business. But ...

  • When is an ISAC not an ISAC?

    Robert Richardson - Editorial Director 18 Feb 2015
  • A lot of what went on at the White House Summit on Cybersecurity and Consumer Protection, held at  Stanford University last week was for show — a reaction in particular to the attacks allegedly ...

  • Prevoty offers context-aware, automatic RASP

    Robert Richardson - Editorial Director 13 Feb 2015
  • Though I’ll admit to a bit of skepticism about Runtime Application Self Protection (RASP), I was nevertheless impressed with a recent look at Prevoty. The two-year-old company’s product, which ...

  • Black Hat researcher turns out the lights

    Robert Richardson - Editorial Director 21 Feb 2014
  • With Black Hat's conference in Singapore coming up next month, I found myself chatting with independent security researcher Nitesh Dhanjani, who'll be giving a presentation at the March 25-28 ...

  • Fortune 1000 companies keep their mouths closed, Willis says

    Robert Richardson - Editorial Director 27 Sep 2013
  • Ran across the Fortune 1000 Cyber Disclosure Report, published earlier this month by Willis North America, a unit of Willis Group Holdings. The report found that among the Fortune 501-1,000, 22% ...

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close