In March I spoke at Cyber Intelligence Asia 2014, where CERTs from most Asians countries were presented. The fact is that only a few CERTs are now dealing in some way with industrial security, ICS and SCADA matters. One of the best of those is CERT of Japan, which is doing a great job here,[…]
Browsing Category: Compliance
The burgeoning evolution of “Internet of Things” has prompted Cisco to issue a challenge to programmers to address these security issues before they go on to become bigger problems.
Dennis Fisher talks with Bruce Schneier about the differences between bulk and targeted surveillance, the most concerning NSA revelations and making surveillance more expensive for intelligence agencies. Download: digital_underground_145.mp3
New report shows that health care industry intellectual property, payment information, and patient data are poorly protected and, in many cases, already compromised.
BlackBerry this week released a new set of privacy guidelines its encouraging third-party app developers to follow to better protect their customers.
Steve Adegbite of Wells Fargo stressed that the idea of operational risk assessment and management is perhaps the most important aspect of organizational security.
A Cambridge University study examined the effectiveness of malware warnings, and urged those alerts be overhauled and written in concrete, specific language.
Dennis Fisher and Mike Mimoso discuss the major security stories of the last two weeks, including the BGP route hijacking, why Do Not Track doesn’t work and the We Are the Cavalry movement.
Dennis Fisher talks with several members of the We Are the Cavalry project, including Josh Corman, Robert Hansen, Space Rogue and John Dickson, about the movement’s origins, its goals to promote research on topics such as medical device security and how to help change the perception of security research.
Dennis Fisher and Mike Mimoso talk about the major stories from the last couple of weeks, including the changes to the Microsoft bug bounty program, the new Internet bug bounty, the Apple transparency report and a new paper on a weakness in Bitcoin.