Google spin-out Chronicle’s new security intelligence service, Backstory, appeals to companies drowning in operational data and desperate for security insights, according to the companies who are using the platform.
Search Results for "Privacy"
Podcast Episode 136: The Geopolitics of Cyber Attacks with LookingGlass and Bruce Schneier on Public Interest Cyber
How will the collapse of the North Korean summit affect that country’s malicious activity online? LookingGlass* joins us to discuss. Also: how to attract more technologists to public interest work. Note: this week’s podcast episode (#136) is sponsored by the firm LookingGlass Cyber Solutions. President Trump has been courting North Korea, while punishing Iran. In our second segment, we talk with Olga Polishchuk of the firm LookingGlass Cyber Solutions about how geopolitical tensions influence cyber activity online. But first: the information security industry is bigger and more diverse than ever. This week, it will converge on San Francisco for the 28th annual RSA Conference. The annual event, which started as a small, clubby gathering of cryptographers, now draws upwards of 40,000 people to downtown San Francisco. As always this year: there’s plenty of business to be done and deals to be struck at RSA on and off the show floor. […]
Following Security Ledger at RSA Conference: Monday
The Security Ledger will be in San Francisco for the 28th RSA Security Conference this week. Check us out if you’re at the show or follow us on social media @securityledger or via the #SLRSA hash tag. I’ll be tweeting and sharing images (and video?) from the show floor.
Spotlight: Synopsys on democratizing Secure Software Development
We speak with Ravi Iyer, the Head of Product Management talks to us about the “democratization” of software development, as more and more companies become software publishers. Ravi and I talk about Polaris, a new software integrity platform that integrates a wide range of software testing and analysis tools into a common platform.
EU calls for End to Default Passwords on Internet of Things
A group representing European telecommunications firms last week published technical specifications for securing a wide range of consumer Internet of Things devices including toys, smart cameras and wearable health trackers.