Bill Gates on Apple v. FBI: A balance has to be made between the needs of investigators and privacy rights
Bill Gates thinks new laws are needed to sort out the encryption conflict going on between law enforcement and tech companies.
Bill Gates thinks new laws are needed to sort out the encryption conflict going on between law enforcement and tech companies.
Cisco’s David Goeckeler Software on how upgrades can reduce the proliferation of security point products.
Experts at RSA Conference say the law being used by the FBI is a stretch, one specifically addressing encryption is needed.
Kevin Walker says his experience with Walmart.com is helpful.
Lynch tells RSA Conference crowd that we can have strong encryption that lets law enforcement break it.
The NSA is too big and slow to effectively fight ingenious cyber attacks without the help of Silicon Valley tech expertise, so it’s time to patch up relations between the two, the head of the NSA told a gathering of tens of thousands at RSA Conference 2016.
Backdoors to break into encrypted communications are a bad idea from a confidentiality point of view, but Congress needs to act to decide how to balance that with the needs of law enforcement to catch terrorists and major criminals, some of the world’s top cryptographers told the RSA Conference 2016.
The message the security industry needs to bring to government is clear: do not put backdoors into encryption, according to the opening keynote of the RSA Conference 2016.
Resilient’s leadership team includes noted security expert Bruce Schneier.
A new IBM mainframe includes security hardware to encrypt data without slowing down transactions and can integrate with IBM security software to support secure hybrid-cloud services.
After a stint focusing on the Netherlands, a group using the Rovnix Trojan has been updated it and repackaged it to steal from the bank accounts of victims in Japan, according to IBM X-Force.
Comcast’s XFINITY Home Security System can be readily exploited so it registers that doors and windows in customers’ homes are closed when they are actually open, Rapid7 has discovered.
Company will provide tool to easily remove vulnerable versions of Java SE.
Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and profit by selling the exploits to others.
IBM is launching a program where customers can share apps they write to augment IBM’s QRadar platform that analyzes security data, detects behavior anomalies and sorts out high-priority risks from the mass of incidents it examines.