All Passcode
- Endpoint security is dead. Long live endpoint security!
A solution to countering enterprise threats and advanced attacks? Invincea believes the right strategy is Contain, Identify, and Control.
- Senator Wyden: Congress may block government access to encrypted consumer devices
It is going to be hard for members of Congress to defend the federal government’s position on this issue, particularly after the NSA 'overreach' on surveillance, said the Senate Intelligence Committee member.
- Opinion: Security firm’s Iran report mostly hype
A new report from the security firm Norse that claims growing Iranian cyberattacks on critical infrastructure relies on questionable data. It's the latest in a string of cybersecurity vendor reports that grab headlines but erode trust in the industry.
- Hacker challenge helps NSA develop future cyberwarriors
The National Security Agency hosted its annual Cyber Defense Exercise this week for students at military academies to hone tech skills – and build next generation leaders to fight its cyberwars.
- Bounty programs could swat more bugs with better tools
Bug bounty programs to spot software flaws have been effective, but there are still bugs remaining. A new study suggests the best improvement to bounty programs could be focusing some attention somewhere else: Bug finding tools.
- Meet DB Networks, a next-generation cyber startup
DB Networks is the fifth graduate of Cync, a partnership between Northrop Grumman and the bwtech@UMBC Cyber Incubator created to support global cyber startups with an eye toward commercializing innovations for the federal marketplace.
- Cybersecurity pros slam threat information-sharing bills
Sixty-five cybersecurity professionals and academics have asked Congress to reject three versions of information-sharing bills over privacy concerns.
- Burner promotion shows how much phone numbers reveal
The Burner Challenge from app maker Ad Hoc Labs lets anyone see how much data can be gleaned from their digits. It's a lot.
- Opinion: Threat intelligence is the judo move needed to take down hackers
Advanced techniques for quickly tracking and analyzing the behavior and tactics of criminal hackers gives companies the tools to defend against emerging cyberthreats.
- Why you have the right to obscurity
Federal Trade Commissioner Julie Brill says that obscurity means that personal information isn’t readily available to just anyone. In our age of aggressive data collection, she says safeguarding obscurity should be a key component of consumer protections.
- Podcast: Yahoo's Alex Stamos on e-mail encryption and keeping 1 billion customers secure
Yahoo's chief information security officer joins Passcode and New America for their monthly podcast about cybersecurity.
- White House hacking reports highlight digital cold war between US, Russia
The Obama administration hasn't confirmed reports that Russians hacked into the White House last year. But the news comes amid growing Russian cyberattacks on American interests and US efforts to arrest and extradite the alleged culprits.
- How an Iranian nuclear deal could trigger cyberconflict
What we learned from a panel discussion at the Atlantic Council about Iran’s growing cybercapabilities.
- Watch live: The future of the Iranian cyberthreat
Join a panel discussion with the Atlantic Council analyzing the latest developments in Iranian cybercapabilities and discussing the chances of larger cyberconflict involving Iran.
- A year after its exposure, Heartbleed bug remains a serious threat
A new study shows that most large corporations haven't done enough to protect themselves against the flaw that can give hackers access to sensitive data.
- Why security pros don't like Obama's proposal for antihacking law
The tech community has long called for reforming the 1986 Computer Fraud and Abuse Act for its overly broad language. But now many worry a White House plan to toughen the law will have a chilling effect on work to expose software weaknesses.
- How exposing more digital flaws could actually be harming security
Jeff Schmidt, whose firm discovered a widespread Microsoft bug, worries that businesses are suffering from vulnerability fatigue. As a result, he says, they aren't doing enough to protect themselves from digital assaults.
- Obama's cyber sanctions order adds punch to fight against foreign hackers
The president's executive order paves the way for economic action against criminal hackers and foreign entities that finance corporate spying operations.
- Opinion: Sanctions may be Obama's best idea yet to battle cyberattacks
Obama signed an executive order today authorizing a program of sanctions to battle digital assaults coming from overseas. While the order seems aimed at the Chinese, it might also be the president's most successful tool for thwarting cyberattacks.
- Will privacy survive a Digital Age of corporate surveillance?
Author Jacob Silverman argues that it's time for consumers to begin asking harder questions about whether companies such as Google should be trusted with so much personal data.