Security News
Carolyn McCarthy gave an excellent TEDx talk about becoming a tech policy activist. It's a powerful call for public-interest technologists....
When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know it’s on the case.
The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems have a mechanism for reporting...
Automate Screening of Exposed Passwords and Password Policy EnforcementHere are four automated password policy options we recommend for NIST compliance.
NeuVector, the leader in Full Lifecycle Container Security, announced the immediate availability of the industry’s first “Security Policy as Code” capability for Kubernetes services. The release –...
Self-driving cars, remote-controlled thermostats, medical treatments, smart TVs and virtual assistants. The Internet of Things (IoT), this vast array of devices connected to the worldwide web, is...
Fugue, the company empowering engineers to build and operate secure cloud systems that are compliant with enterprise policies, announced it has open sourced the Fugue Rego Toolkit (Fregot) to...
Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest technologists. (I also maintain a...
More companies than ever are adopting new email security methods, like DMARC, but few actually put them to full use.
Vimeo is under fire for allegedly collecting and storing users' facial biometrics in videos and photos without their consent or knowledge.