Tag: security-management

Silk Road Raising Questions About Government Spying (Again)

It’s a case that’s captured everyone’s attention — pirates, drug trafficking, hit men, government intrigue. By now, few people haven’t heard about Silk Road, run by the now notorious Dread Pirate Roberts, a pseudonym from the film “The Princess Bride.” It’s an interesting next chapter to perhaps the biggest news story of 2013 — Edward Snowden’s revelations about NSA cyber snooping

5 Top Targets for Today’s Hackers

Black Hat USA  bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the activity at this year’s show, that actually might be something of an understatement. From the defense of government surveillance delivered by NSA Director  General Keith Alexander  to briefings on the coming “cryptopocalypse” and the risks associated with embedded devices and the Internet of Things, Black Hat reminds us that a little bit of paranoia is warranted in today’s connected world.

Your Net Worth Is Online – And Less Safe Than Ever

The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the  brightest minds in IT security  each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities. And not a second too soon, since every week seems to usher in another security catastrophe. This week’s shocker  was the outing of a hole in mobile device SIM cards, by Karsten Nohl, the founder of Security Research Labs in Berlin

Security Gaffes You Might Have Missed So Far This Year

If you can believe it, 2013 is already halfway over. With summer here, businesses everywhere are feeling the heat in their IT organizations – as they fight a growing array of security concerns, threatening their profitability and reputation alike.

Could Your Jewelry Stop Hackers?

Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be  hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.

Beware: Hackers in your car, TV and light-bulbs?

We all know we should be careful transacting online, but are you thinking about cyber-security when you’re watching TV or driving your car? If you’re like me, those flashy new products at last week’s CES show probably got you dreaming about upgrading some of your old-school gadgets. The trend today is moving away from stand-alone devices to futuristic “connected” devices, those that can talk to the cloud or even interact with your other systems and appliances.

Talk to ME Tuesday: Advice about Investing in Security Management

ManageEngine continues our weekly blog series called Talk to ME Tuesday. Each week we discuss interesting topics from the world of technology with you, the people that live and breathe it everyday.  People are spending more money in security management, said Andrew Hay, Senior Analyst for 451 Research . Hay believes that the rise in reporting of high profile breaches has made more people think about investing in overall security management rather than just having firewalls or intrusion detection systems.