whitepaper semiwiki ad jitter
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 332
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 332
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Let’s Talk About Cyber Risks

Let’s Talk About Cyber Risks
by Matthew Rosenquist on 11-06-2016 at 7:00 am

In the last 12 months, we have seen an unprecedented number of cyber-attacks occur or come to light. Sophisticated attacks against governments, businesses, consumers, and the pillars of the Internet itself. The future appears to be fraught with run-away risks. Can security tame data breaches, ransomware, massive DDoS assaults,… Read More


AI on the Edge

AI on the Edge
by Bernard Murphy on 11-02-2016 at 7:00 am

A lot of the press we see on AI tends to be of the “big iron” variety – recognition algorithms for Facebook images, Google TensorFlow and IBM Watson systems. But AI is already on edge-nodes such as smartphones and home automation hubs, for functions like voice-recognition, facial recognition and natural language understanding.… Read More


The challenge of insecure IoT

The challenge of insecure IoT
by Bernard Murphy on 11-01-2016 at 7:00 am

An attack on Dyn (a DNS service provider) through a distributed denial of service (DDOS) attack brought down Github, Amazon and Twitter for a while and is thought to have been launched through IoT devices. Hangzhou Xiongmai, a provider of webcams and the most publicly pilloried source of weakness in the attack is now recalling all… Read More


The IoTrojan Horse – an army of toasters

The IoTrojan Horse – an army of toasters
by Bill Montgomery on 10-30-2016 at 4:00 pm

Most everybody is familiar with the term Trojan Horse, drawn from Greek mythology. It’s a tale from the Trojan War where, after a fruitless 10-year attempt to capture the city of Troy, the Greeks constructed a huge wooden horse, left it outside the city walls, and then sailed away, seemingly accepting defeat. The Trojans were elated,Read More


Top 5 Things to Know About Recent IoT Attacks

Top 5 Things to Know About Recent IoT Attacks
by Matthew Rosenquist on 10-30-2016 at 12:00 pm

Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over… Read More


End-to-End Secure IoT Solutions from ARM

End-to-End Secure IoT Solutions from ARM
by Bernard Murphy on 10-25-2016 at 11:30 am

ARM announced today a comprehensive suite of solutions for IoT support, from IP optimized for applications in this space all the way to cloud-based support to manage edge devices in the field. Their motivation is to provide a faster path to secure IoT, from the chip to the cloud. One especially interesting component of this solution… Read More


Should Cybercrime Victims be Allowed to Hack-Back?

Should Cybercrime Victims be Allowed to Hack-Back?
by Matthew Rosenquist on 10-19-2016 at 12:00 pm

Being hacked is a frustrating experience for individuals and businesses, but allowing victims to hack-back against their attackers is definitely a dangerous and ill-advised path.

Compounding the issues is the apparent inability of law enforcement and governments to do anything about it. Cybercrime is expected to reach a dizzying… Read More


Phish Finding

Phish Finding
by Bernard Murphy on 10-18-2016 at 7:00 am

I wrote recently on the biggest hole in security – us. While sophisticated hacks on hardware and software make for good technology reading, fooling users into opening the front door remains one of the easiest and lowest cost ways for evil-doers to break into our systems. And one of the more popular ways to fool us is phishing in all … Read More


Artificial Intelligence for Cyber Security

Artificial Intelligence for Cyber Security
by Alex G. Lee on 10-17-2016 at 12:00 pm

Since the United States is such a large market for products and services from nearly all technology innovations, a patent counting for growth in patenting over a period of times in the US can be a good measuring tool for monitoring the evolution of technology innovations. Following figure shows the growth trends for the artificial… Read More