Cyber crime, drug trafficking: Analogies to be drawn and lessons learned

Over more than a decade covering the information security beat, I’m repeatedly struck by the parallels between international cyber crime and the international drug trade. You can stretch the analogy thin by carrying it too far, but there are common conclusions to be drawn and lessons to be learned. Both are often cast in terms of law...

Read more

Don't depend on trust to protect data in cloud: Startup Porticor addresses key management

In one survey after another, we see that security concerns are a top inhibitor to cloud adoption. Companies want to get the flexibility and cost advantages of cloud computing, but there’s often trepidation about putting data on servers that are outside a company’s own data center. Cloud security is an issue of trust and...

Read more

Wither Anonymous after the latest arrests?

It’s impossible to predict where loosely organized, pseudo-movement hacktivism goes from here, following the arrests of five people associated with LulzSec and Anonymous and a sixth person charged in the hack of intelligence services company Stratfor. These actions follow the arrests of 25 people associated with Anonymous in an Interpol...

Read more

Is security growing up? Business intelligence is a key; Sensage extends connectors to BI tools

Enterprises “get” the value of information. They understand that they receive, generate and store staggering volumes of data, which has the potential to be leveraged as actionable intelligence. The company that does the best job of correlating and analyzing their data and putting it to work has a leg up over the competition. It can be...

Read more

Heart-stopping research: Hacking from pacemakers to autos

Technology has become so pervasive in our lives today that we are almost completely dependent on it. It makes you wonder, how easily can these technologies that control everything from pacemakers to cars be hacked? The answer to that question is surprising and even scary. Avi Rubin, professor of computer science at Johns Hopkins University and...

Read more

More Posts