#RSAC: Detect at Machine not Human Speed, Says HPE CTO
we need to build security into the data and make sure we can isolate and recover applications
More results...
we need to build security into the data and make sure we can isolate and recover applications
69% of wearable device owners forego login credentials, such as PINs, passwords, fingerprint scanners and voice recognition.
New draft could expand police powers, rather than improve privacy protections
Avivah Litan argues cellular metadata analysis will be more useful to Feds
I’ve made some comments regarding Apple vs. the FBI at Wired.
Rami Malek spoke of his preparation and research for his role in Mr Robot at RSA Conference
Microsoft president says people have been questioning trust for good reason
Criminals can preselect and pursue specific victims without user interaction, and quickly rule out non-viable targets, such as honeypots.
Attackers need an ecosystem of malware writers, exploit developers, botnet operators and mules
Nearly one in 10 smartphone users say there isn’t a single thing a hacker could take from their phone that would upset them.