Cyber after Snowden
How the Snowden leaks have contributed to the larger conversation about privacy and security.
Kacy Zurkus | 26 Oct | Read more
How the Snowden leaks have contributed to the larger conversation about privacy and security.
Kacy Zurkus | 26 Oct | Read more
Thoughts from Chris Inglis, former Deputy Director of NSA, about whistleblower Edward Snowden’s reasons for leaking classified NSA documents
By Ira Winkler and Araceli Treu Gomes | 31 Mar | Read more
The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.
David Geer | 20 Jun | Read more
The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.
Rob Enderle | 13 Jun | Read more
The Department of Homeland Security may be complaining that encryption is interfering with their attempts to eavesdrop on criminals and terrorists -- but they're not the only ones inconvenienced.
Maria Korolov | 05 May | Read more
The debate over "hacking back" (also known as "active defense") against criminal cyber attackers has raged for decades. And it doesn't look like it will be ending anytime soon.
Taylor Armerding | 02 May | Read more
If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
Paul Roberts | 26 Mar | Read more
"Whodunit" is essential to solving crimes. You can't make an arrest or prosecute a crime if you don't even know who committed it.
Taylor Armerding | 10 Feb | Read more
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
By Dirk A. D. Smith | 10 Feb | Read more
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
Matt Weinberger | 15 Nov | Read more
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
Jaikumar Vijayan | 23 Jan | Read more
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
Jaikumar Vijayan | 19 Nov | Read more
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
Jaikumar Vijayan | 15 Nov | Read more
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
Patrick Thibodeau | 26 Aug | Read more
Members of Judiciary Committee express concern over broad-ranging, secretive authorities under Foreign Intelligence Surveillance Act, push for bill to strengthen oversight, transparency.
Kenneth Corbin | 31 Jul | Read more