NSA PRISM News
May 10, 2016
Twitter ordered its business partner Dataminr to cut off the Twitter firehose feed access for U.S. intelligence agencies, but experts expect the NSA won't miss much.
March 02, 2016
Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.
May 20, 2015
A newly discovered TLS vulnerability that affects thousands of websites, servers and browser users could allow attackers to bypass encryption.
February 10, 2015
Box will give enterprise cloud data storage customers the ability to control and store their own encryption keys through its new Enterprise Key Management service.
NSA PRISM Get Started
Bring yourself up to speed with our introductory content
Graph databases play six degrees of separation to find real connections. See how IT teams can use the database approach for businesses. Continue Reading
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above and beyond compliance requirements. Global threat intelligence services have continued to evolve and play more of role in security information and event management and endpoint security products. More organizations are collecting and analyzing global threat information against vulnerabilities in their IT infrastructure and other assets. We evaluate the value of these services in risk assessment and find out how to take advantage of endpoint intelligence. We also report on the growing trend of community-based threat intelligence services, and look at the puppet masters of malware, command-and-control networks. Columnist Marcus Ranum interviews Avi Rubin about his latest work on shielding medical information systems. Continue Reading
Evaluate NSA PRISM Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
User and vendor concerns after the Snowden NSA revelations may bring increased efforts to shore up UC security in unified communications environments. Continue Reading
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses. Continue Reading
NSA data collection, metadata as surveillance and code names: The Data Mill reports. Continue Reading
Manage NSA PRISM
Learn to apply best practices and optimize your operations.
The NSA's Information Assurance Directorate released a report on malware defense. Uncover which guidance and best practices would be fruitful to integrate into your enterprise security plan. Continue Reading
Is Apple iMessage encryption strong enough to mitigate reverse-engineering attacks? Learn more about one of the top iMessage security risks. Continue Reading
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading