Security News









2015-07-21 12:38
The comment period for the proposed amendments to the Wassenaar Arrangement regarding "cybersecurity items" has ended, and the overwhelming majority of the 150+ comments submitted are negative. As ...

2015-07-21 11:51
In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very different security models. The...