Recent Posts

Oracle’s Cantankerous CSO: a Symptom or the Cause?

In-brief: Oracle CSO Mary Ann Davidson’s screed against vulnerability researchers was a shock – unless you’ve been listening to what she and her employer have been saying for the last two decades.

Tesla’s Built a Server / Database … on Wheels

In-brief: Tesla Motors CTO attends DEF CON thanking researchers for finding flaws in the Model S and seeking harmony with the security community. If you can’t beat them, join them. Not only were Tesla Motors representatives were on hand at last week’s DEF CON 23, they were recruiting, and answering questions about one of the talks targeting their Model S car. They even parked one of the cars within the Bally’s Las Vegas Hotel and Casino Convention Hall right next to the conference’s annual Capture the Flag competition. Over the course of the last two years, researchers Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, and Marc Rogers, principal security researcher for CloudFlare, discovered six vulnerabilities and then worked with the electric car company to patch them. Last Wednesday, one day before their scheduled talk, Tesla pushed out a patch to every Model S in the world. And […]

Tech, Retail Firms Propose Privacy Standards for Internet of Things

In-brief: The Online Trust Alliance, a group representing some of the largest technology and retail firms in the U.S., has proposed a framework for ensuring the privacy and security of connected devices. The OTA proposal would eliminate some of the more egregious data harvesting practices of connected device makers.

When Securing the Internet of Things: Collaborate or Die

In-brief: Cisco’s Marc Blackmer argues that collaboration – not exceptionalism – must be the norm for defending the Internet of Things. 

Black Hat: Talent Scarce, Firms Look to Automation and Ai

In-brief: with security talent scarce, experts at the Black Hat Briefings say that security automation fueled by machine learning and data analytics is going to play an increasing role in security operations.